Microsoft Windows Server Update
Services Operations Guide
Microsoft Corporation
Published: June 3, 2005
Author: Ben Aguiluz
Editor: Sean Bentley
Abstract
This paper documents the major tasks involved in administering and troubleshooting
Microsoft® Windows Server™ Update Services.
The information contained in this document represents the current view of Microsoft
Corporation on the issues discussed as of the date of publication. Because Microsoft
must respond to changing market conditions, it should not be interpreted to be a
commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any
information presented after the date of publication.
This White Paper is for informational purposes only. MICROSOFT MAKES NO
WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN
THIS DOCUMENT.
Complying with all applicable copyright laws is the responsibility of the user. Without
limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose,
without the express written permission of Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other
intellectual property rights covering subject matter in this document. Except as expressly
provided in any written license agreement from Microsoft, the furnishing of this document
does not give you any license to these patents, trademarks, copyrights, or other
intellectual property.
Unless otherwise noted, the example companies, organizations, products, domain
names, e-mail addresses, logos, people, places, and events depicted herein are fictitious,
and no association with any real company, organization, product, domain name, e-mail
address, logo, person, place, or event is intended or should be inferred.
© 2005 Microsoft Corporation. All rights reserved.
Microsoft, SQL Server, Windows, and Windows Server are either registered trademarks
or trademarks of Microsoft Corporation in the United States and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks
of their respective owners.
Contents
Microsoft Windows Server Update Services Operations Guide ....................................... 11
Administering Windows Server Update Services ............................................................. 11
Overview of Windows Server Update Services ................................................................ 12
The WSUS Solution ....................................................................................................... 12
Managing Windows Server Update Services.................................................................... 12
Setting Up and Running Synchronizations ....................................................................... 13
Synchronizing Updates by Product and Classification .................................................. 13
Configuring Proxy-server Settings ................................................................................. 14
Configuring the Update Source ..................................................................................... 15
Specifying Where to Store Updates .............................................................................. 16
Synchronizing Manually or Automatically ...................................................................... 16
Managing Computers and Computer Groups ................................................................... 17
Managing Client Computers ............................................................................................. 17
Managing Computers on the Computers Page ............................................................. 18
Managing Computer Groups ............................................................................................. 19
Server-side Targeting .................................................................................................... 20
Client-side Targeting...................................................................................................... 20
Managing Computer Groups on Your WSUS Server ................................................. 21
Managing Updates ............................................................................................................ 22
Updates Overview ............................................................................................................. 22
How WSUS Stores Updates .......................................................................................... 22
Managing Updates by Using WSUS.............................................................................. 23
Update Products and Classifications ............................................................................. 24
Products Updated by WSUS ...................................................................................... 24
Update Classifications ................................................................................................ 24
Viewing Updates ............................................................................................................... 26
Approving Updates ............................................................................................................ 27
Approving Updates for Detection ................................................................................... 28
Approving Updates for Installation ................................................................................. 28
Declining Updates .......................................................................................................... 30
Approving Updates for Removal .................................................................................... 30
Approving Updates Automatically .................................................................................. 31
Automatically Approving Updates for Detection ............................................................ 31
Automatically Approve Updates for Installation ............................................................. 32
Automatically Approving Revisions to Updates ............................................................. 33
Approving Superseding or Superseded Updates .......................................................... 34
Recommended Process for Approving a Superseding Update ................................. 35
Approving Office Updates ................................................................................................. 35
Approving SQL Server and Exchange Server Updates .................................................... 36
Updating Microsoft SQL Server Instances .................................................................... 36
Updating Microsoft SQL Server and Microsoft Exchange Servers that are Part of a
Cluster ........................................................................................................................ 36
Testing Updates ................................................................................................................ 37
Storing Updates ................................................................................................................ 38
Specifying Where to Store Updates .................................................................................. 38
Local Storage Considerations ....................................................................................... 38
About Express Installation Files ................................................................................. 39
Changing the Location where You Store Update Files Locally ..................................... 40
Managing the Databases .................................................................................................. 41
Running in Replica Mode .................................................................................................. 42
Backing Up Windows Server Update Services ................................................................. 43
Best Practices with Windows Server Update Services ..................................................... 47
Use Group Policy to Update Multiple Computers .......................................................... 47
Schedule Update Installations when there is Little Chance for Lost Productivity.......... 49
For maximum control over when your servers are restarted as necessitated by an
update installation, set Group Policy to Download the updates automatically and
notify when they are ready to be installed, and then create a script that enables to
you accept and install the updates and then restart the computer on demand ......... 50
Managing WSUS from the Command Line ....................................................................... 51
Running WSUSutil.exe .................................................................................................. 51
Export ......................................................................................................................... 55
Syntax ..................................................................................................................... 55
Import ......................................................................................................................... 55
Syntax ..................................................................................................................... 55
Migratesus .................................................................................................................. 56
Syntax ..................................................................................................................... 56
Movecontent ............................................................................................................... 56
If the drive is full ...................................................................................................... 57
If the hard disk fails ................................................................................................. 57
Syntax ..................................................................................................................... 58
Reset .......................................................................................................................... 58
Syntax ..................................................................................................................... 58
Deleteunneededrevisions ........................................................................................... 58
Syntax ..................................................................................................................... 59
Listinactiveapprovals .................................................................................................. 59
Syntax ..................................................................................................................... 60
Removeinactiveapprovals .......................................................................................... 60
Syntax ..................................................................................................................... 60
Monitoring Windows Server Update Services .................................................................. 60
Update Status Terminology .............................................................................................. 61
Running Reports ............................................................................................................... 63
Using the Reports Page................................................................................................. 63
Status of Updates Report ........................................................................................... 64
Update summary view ............................................................................................ 65
Computer group view .............................................................................................. 66
Computer view ........................................................................................................ 67
Printing the report ................................................................................................... 68
Status of Computers Report ....................................................................................... 69
Synchronization Results Report ................................................................................. 70
Settings Summary Report .......................................................................................... 71
Running Compliance Status Reports ............................................................................ 73
Securing Windows Server Update Services ..................................................................... 74
Troubleshooting Windows Server Update Services ......................................................... 74
WSUS Server Administration Issues ................................................................................ 74
Setup Issues ..................................................................................................................... 75
Check for required software and hardware ................................................................... 75
In some cases, setup might fail if you choose the WMSDE database .......................... 75
If the Server service is not running when you install WSUS, the WSUS installation fails
.................................................................................................................................... 75
Upgrade Issues ................................................................................................................. 75
When an upgrade fails, WSUS might be uninstalled ..................................................... 75
Uninstalling WSUS from SQL Server ................................................................................ 76
Uninstalling might leave some WSUS configurations on computers running SQL server
.................................................................................................................................... 76
Cannot access the WSUS console ................................................................................... 76
Grant users permissions for WSUS console access ..................................................... 76
You cannot access the WSUS console with an IP address when WSUS is configured to
use a proxy server ...................................................................................................... 77
Cannot access the WSUS console and a timeout error message appears .................. 77
Cannot access the WSUS console on a Windows 2000 server after applying the hisec
server.inf security template ........................................................................................ 77
Promoting the WSUS server to a domain controller might disrupt your ability to access
the WSUS console ..................................................................................................... 78
Cannot access the WSUS console on Windows 2000 Server configured as a domain
controller ..................................................................................................................... 79
Update storage issues ...................................................................................................... 80
The updates listed in the WSUS console do not match the updates listed in your local
folder........................................................................................................................... 80
Synchronization issues ..................................................................................................... 80
Check proxy-server settings by using the WSUS console ............................................ 81
Check the name of the upstream WSUS server ........................................................... 81
Check update storage options ....................................................................................... 82
Verify that users and the network service have Read permissions to the local update
storage directory......................................................................................................... 82
On a downstream WSUS server, check that the updates are available on the upstream
WSUS server .............................................................................................................. 82
Restart the BITS service ................................................................................................ 83
If you are unable to download update files to your local WSUS server, your server
might not support the necessary HTTP protocol ........................................................ 83
The number of updates that are approved on a parent upstream server does not match
the number of approved updates on a replica server ................................................ 84
Update approval issues..................................................................................................... 84
If IIS Lockdown is installed on WSUS and client computers, do not download updates
stored on the WSUS server........................................................................................ 84
New approvals can take up to one minute to take effect ............................................... 85
Remote computers accessed by using Terminal Services cannot be restarted by nonadministrators ............................................................................................................. 85
The number of updates that are approved on a parent upstream server does not match
the number of approved updates on a replica server ................................................ 85
Client computers do not appear in the WSUS console ..................................................... 85
Problem with client self-update ...................................................................................... 86
Backup and restore issues ................................................................................................ 86
If you cannot access WSUS data after restoring the database, check the WSUS server
name and user permissions for the database ............................................................ 86
General error messages ................................................................................................... 86
…some services are not running. Check the following services… ............................... 86
Selfupdate .................................................................................................................. 86
WSUSService.exe ...................................................................................................... 87
Web services .............................................................................................................. 87
SQL service ................................................................................................................ 87
Client Computer Administration Issues ............................................................................. 87
Automatic Updates must be updated ................................................................................ 88
Troubleshooting client self-update issues ..................................................................... 88
How to differentiate between the SUS client and WSUS client ................................. 88
Verify that the client software in your organization can self-update ........................... 90
Verify that the SUS clients are pointed to the WSUS server ..................................... 90
Check for the selfupdate tree on the WSUS server ................................................... 91
Check IIS logs on the WSUS Server .......................................................................... 91
If you have installed SharePoint on the default Web site in IIS, configure SharePoint
to not interfere with Self-update .............................................................................. 91
Check network connectivity on the WSUS client computer ....................................... 92
Check logs on the SUS client computer..................................................................... 93
Manipulate registry settings on the SUS client computer .......................................... 94
Computers are not appearing in the correct computer groups ......................................... 96
Verify that the WSUS console is set to use client-side targeting .................................. 96
Verify that target computer group names match groups on the WSUS server ............. 96
Wait an hour for changes to take effect ......................................................................... 96
Additional Resources for Windows Server Update Services ............................................ 97
Windows Server Update Services Communities ........................................................... 97
More Documentation ..................................................................................................... 97
11
Microsoft Windows Server Update
Services Operations Guide
This guide describes the major tasks involved in administering and troubleshooting
Windows Server Update Services.
Note:
A downloadable copy of this document is available on the Microsoft Download
Center at
http://www.microsoft.com/downloads/details.aspx?FamilyId=E26BCDB4-EF0B4399-8A71-9B3B00C4F4CD&displaylang=en
In this guide

Administering Windows Server Update Services

Troubleshooting Windows Server Update Services

Additional Resources for Windows Server Update Services
Administering Windows Server Update
Services
This section contains background information and procedures for performing the major
tasks involved in administering Windows Server Update Services.
In this guide

Overview of Windows Server Update Services

Managing Windows Server Update Services

Monitoring Windows Server Update Services

Securing Windows Server Update Services
12
Overview of Windows Server Update
Services
By using Windows Server Update Services (WSUS), you can fully manage the process of
getting software updates that are released through Microsoft Update, and then distribute
them to servers and client computers in your network.
The WSUS Solution
The WSUS solution provides a management infrastructure consisting of the following:

Microsoft Update: the Microsoft Web site that WSUS components connect to for
updates to Microsoft products.

Windows Server Update Services server: the server component that is installed on
a computer running a Microsoft Windows 2000 Server with Service Pack 4 (SP4) or a
Microsoft Windows Server 2003 operating system inside the corporate firewall.
WSUS server software enables administrators to manage and distribute updates
through a Web-based tool, which can be accessed from Internet Explorer on any
computer running a Windows operating system in the corporate network. In addition,
a WSUS server can be the update source for other WSUS servers. In a WSUS
implementation, at least one WSUS server in the network must connect to Microsoft
Update to get available updates. The administrator can determine, based on network
security and configuration, how many other servers connect directly to Microsoft
Update.

Automatic Updates: the client computer component built into Windows 2000 with
SP3, Microsoft Windows XP, and Windows Server 2003 operating systems.
Automatic Updates enables both server and client computers to receive updates from
Microsoft Update or from a server running WSUS.
Managing Windows Server Update Services
In this section

Setting Up and Running Synchronizations

Managing Computers and Computer Groups

Managing Updates

Running in Replica Mode

Backing Up Windows Server Update Services
13

Managing WSUS from the Command Line
Setting Up and Running Synchronizations
During synchronization, your server running Windows Server Update Services (WSUS)
downloads updates (update metadata and files) from an update source. When your
WSUS server synchronizes for the first time, it will download all of the updates you
specified when you configured synchronization options. After the first synchronization,
your WSUS server determines if any new updates have been made available since the
last time it made contact with the update source, and then downloads only new updates.
The Synchronization Options page is the central access point in the WSUS console for
customizing how your WSUS server synchronizes updates. On this page, you can specify
which updates are synchronized automatically, where your server gets updates,
connection settings, and the synchronization schedule.
After you synchronize updates to your WSUS server, you must then approve them before
the WSUS server can perform any action for them. The exceptions to this are updates
classified as Critical Updates and Security Updates, which are automatically approved
for detection. For more information, see "Approving updates for detection in Approving
Updates.
Note:
Because WSUS initiates all its network traffic, there is no need to configure
Windows Firewall on a WSUS server connected directly to Microsoft update.
Synchronizing Updates by Product and Classification
Your WSUS server downloads updates based on the products or product families (for
example, Windows, or Windows Server 2003, Datacenter Edition) and classifications (for
example, Critical Updates or Security Updates) that you specify. At the first
synchronization, your WSUS server downloads all of the updates available in the
categories you have specified. At subsequent synchronizations, your WSUS server
downloads only the newest updates (or changes to the updates already available on your
WSUS server) in the categories you specified.
You specify update products and classifications on the Synchronization Options page
under Products and Classifications. Products are grouped in a hierarchy, by product
family. For example, if you select Windows, you automatically select every product that
falls under that product hierarchy. By selecting the parent check box you not only select
all items under it, but all future releases too. Selecting the child check boxes will not
select the parent check boxes. The default setting for Products is All Windows Products,
14
and for Update classifications, the default setting is Critical Updates and Security
Updates. You must specify update classifications individually.
If your WSUS server is running in replica mode, you will not be able to perform this task.
For more information about replica mode, see Running in Replica Mode.
To specify update products and classifications for synchronization
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Products and Classifications, under Products, click Change.
3. In the Add/Remove Products dialog box, under Products, select the products
or product families for the updates you want your WSUS server to synchronize,
and then click OK.
4. Under Products and Classifications, under Update classifications, click
Change.
5. In the Add/Remove Classifications dialog box, in Classifications, select the
update classifications for the updates you want your WSUS server to
synchronize, and then click OK.
6. Under Tasks, click Save settings, and then click OK.
Note:
If you want to stop synchronizing updates for one or more specific products
or product families, clear the appropriate check boxes in the Add/Remove
Products dialog box, and then click OK. Your WSUS server will stop
synchronizing new updates for the products you have cleared. However,
updates that were synchronized for those products before you cleared them
will remain on your WSUS server and will be available on the Updates page.
Configuring Proxy-server Settings
You can configure your WSUS server to use a proxy server during synchronization with
an upstream server or Microsoft Update. In addition, you can specify a port number and
whether you want your server to connect to the proxy server by using specific user
credentials.
You specify proxy-server settings on the Synchronization Options page under Proxy
server. This setting will apply only when your WSUS server runs synchronizations. By
default this option is not enabled, and your WSUS server will connect directly to the
upstream server or Microsoft Update. By default, the proxy-server option is not selected,
15
which means that your WSUS server will attempt to connect directly to another WSUS
server or Microsoft Update during synchronization.
Because WSUS initiates all of its network traffic, you do not need to configure Windows
Firewall on a WSUS server connected directly to Microsoft Update.
To specify a proxy server for synchronization
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Proxy server, select the Use a proxy server when synchronizing check
box, and then type the server name and port number (port 80 is the default) of
the proxy server.

If you want to connect to the proxy server by using specific user credentials,
select the Use user credentials to connect to the proxy server check box,
and then enter the user name, domain, and password of the user in the
corresponding boxes.

If you want to enable basic authentication for the user connecting to the
proxy server, select the Allow basic authentication (password in clear
text) check box.
3. Under Tasks, click Save settings, and then click OK.
Configuring the Update Source
The update source is the location from which your WSUS server gets its updates and
update information (metadata). You can specify that the update source be either
Microsoft Update or another WSUS server (in this scenario, the WSUS server that acts
as the update source is the upstream server, and your server is the downstream server).
Options for customizing how your WSUS server synchronizes with the update source
include the following:

You can specify a custom port for synchronization. For general information about
configuring ports, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.

You can use SSL to secure synchronization of update information between WSUS
servers. For more information about using SSL, see Securing Windows Server
Update Services.
16
To specify the update source for your WSUS server
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Update Source, do one of the following:

If you want your WSUS server to synchronize directly from Microsoft Update,
click Synchronize from Microsoft Update. If your server is running in
replica mode, this option will is disabled. For more information, see Running
in Replica Mode.

If you want to synchronize from another WSUS server in your network, click
Synchronize from an upstream Windows Server Update Services
server, and then type the server name and port number in the corresponding
boxes.

If you want to use Secure Socket Layers (SSL) when synchronizing update
information (metadata) synchronization, type the port number that the
upstream server uses for SSL connections, and then select the Use SSL
when synchronizing update information check box. For more information
about using SSL during synchronization, see Securing Windows Server
Update Services.

If your WSUS server is running in replica mode, you just need to type the
server name in the Server name box. The upstream server does not have to
be the administration server (for example, it can be another replica mode
server). For more information about replica mode, see Running in Replica
Mode.
3. Under Tasks, click Save settings, and then click OK.
Specifying Where to Store Updates
For more information, see Specifying Where to Store Updates.
Synchronizing Manually or Automatically
You can either synchronize your WSUS server manually or specify a time for it to
synchronize automatically on a daily basis.
To synchronize your server manually
1. On the WSUS console toolbar, click Options, and then click Synchronization
17
Options.
2. Under Schedule, click Synchronize manually.
3. Under Tasks, click Save settings, and then click OK.
To synchronize your WSUS server immediately
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Tasks, click Synchronize now.
To set up an automatic synchronization schedule
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Schedule, click Synchronize daily at, and then in the list select the time
you want synchronization to start each day.
3. Under Tasks, click Save settings, and then click OK.
Managing Computers and Computer Groups
In this section

Managing Client Computers

Managing Computer Groups
Managing Client Computers
WSUS enables you to manage the entire process of updating your computers, including
manually and automatically determining which updates they need and receive, specifying
when the updates are installed, and monitoring the status of update deployment on your
computers.
The central access point in the WSUS console for managing computers is the
Computers page, which displays a list of computers that have been configured to get
updates from the WSUS server. The computers are displayed by computer group, and
you can filter the computer list to a specific computer group. By selecting a computer in
the list, you can view its properties, which include general details about the computer and
18
the status of updates for it—for example, the installation or detection status of an
update for a particular computer.
You can also manage computer groups on the Computers page, which includes creating
the groups and assigning computers to them. For more information about managing
computer groups, see Managing Computer Groups.
Important:
You must first set up a client computer to contact the WSUS server before you
can manage it from that server. Until you perform this task, your WSUS server
will not recognize your client computer, and will not display it in the computer list
on the Computers page. For more information about setting up a client
computer, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
A client computer can only be set to communicate with one WSUS server at a
time. If you later change this setting and specify a different WSUS server, the
client computer stops contacting the WSUS server specified earlier. However,
the client computer will remain on the list of computers and in the computer
groups specified on that earlier WSUS server. In addition, the original WSUS
server will report the last time the client computer contacted it (which will be
accurate—it will be before the client computer stopped connecting to it). To stop
the client computer from displaying on the earlier specified WSUS server, you
must remove the computer from the WSUS server.
Managing Computers on the Computers Page
The following are common tasks you can perform on the Computers page. Before you
can add a computer to a computer group, you must have created a computer group. For
more information about creating computer groups, see Managing Computer Groups.
To view the properties for a computer
1. On the WSUS console toolbar, click Computers.
2. In Groups, click the computer group to which the computer currently belongs to.
3. In the list of computers, click the computer for which you want to view properties.
4. In the properties pane, do either of the following:

Click the Details tab for general information about the computer.

Click the Status tab for approval and update status for the computer.
19
To add a computer to a computer group
1. On the WSUS console toolbar, click Computers.
2. In Groups, click the computer group to which the computer currently belongs.
3. In the list of computers, click the computer that you want to move.
4. Under Tasks, click Move selected computer.
5. In the Computer group dialog box, click the computer group that you want to
move the computer to, and then click OK.
Note:
If your computer already belongs to a computer group, then after you perform
this task it will belong to the new computer group you specify and not to the
earlier computer group. However, it will remain a member of the All
Computers group.
To remove a computer from a WSUS server
1. On the WSUS console toolbar, click Computers.
2. In Groups, click the computer group to which the computer currently belongs to.
3. In the list of computers, click the computer you want to remove.
4. Under Tasks, click Remove the selected computer, and then click OK.
Note:
After you perform this task, you will not be able to manage update distribution
for the client computer on the WSUS console, nor will the client computer will
not be able to receive updates from the WSUS server.
Managing Computer Groups
WSUS enables you to target updates to groups of client computers. This capability can
help you ensure that specific computers get the right updates at the most convenient
times on an ongoing basis. For example, if all computers in one department of your
organization have a specific configuration (such as all computers in the Accounting
team), you can determine what updates those computers get, at what time, and then use
WSUS reporting features to evaluate the success of update activity for that computer
group.
20
By default, each computer is already assigned to the All Computers group. Computers
will also be assigned to the Unassigned Computers group until you assign them to
another group. Regardless of the group you assign a computer to, it will also remain in
the All Computers group. A computer can be in only one other group in addition to the All
Computers group.
You can assign computers to computer groups by using one of two methods, server-side
or client-side targeting, depending on whether or not you want to automate the process.
With server-side targeting, you use the Move the selected computer task on the
Computers page to move one or more client computers to one computer group at a time.
With client-side targeting, you use Group Policy or edit the registry settings on client
computers to enable those computers to automatically add themselves into the computer
groups. You must specify which method you will use by selecting one of the two options
on the Computers Options page.
Note:
If your WSUS server is running in replica mode, you will not be able to create
computer groups on that server, you will only inherit the computer groups created
on the administration server from which your server inherits its settings. For more
information about replica mode, see Running in Replica Mode.
Server-side Targeting
With server-side targeting, you use the WSUS console to both create groups and then
assign computers to the groups. Server-side targeting is an excellent option if you do not
have many client computers to update and you want to move client computers into
computer groups manually.
To enable server-side targeting on your WSUS server, click the Use the Move
computers task in Windows Server Update Services option on the Computers
Options page.
Client-side Targeting
With client-side targeting, you enable client-computers to add themselves to the
computer groups you create in the WSUS console. You can enable client-side targeting
through Group Policy (in an Active Directory network environment) or by editing registry
entries (in a non-Active Directory network environment) for the client computers. When
the client computers connect to the WSUS server, they will add themselves into the
correct computer group. Client-side targeting is an excellent option if you have many
client computers and want to automate the process of assigning them to computer
groups.
21
To enable client-side targeting on your WSUS server, click the Use Group Policy or
registry settings on client computers option on the Computers Options page.
To specify the method for assigning computers to groups
1. On the WSUS console toolbar, click Options, and then click Computer Options.
2. In Computer Options, do one of the following:

If you want to create groups and assign computers through the WSUS
console (server-side targeting), click Use the Move computers task in
Windows Server Update Services.

If you want to create groups and assign computers by using Group Policy or
by editing registry settings on the client computer (client-side targeting), click
Use Group Policy or registry settings on computers.
3. Under Tasks, click Save settings, and then click OK.
Managing Computer Groups on Your WSUS Server
Regardless of the method you use to assign client computers to computer groups, you
must also create the computer groups in the WSUS console. In you use the client-side
targeting method, you must create the computer groups in the WSUS console before
your client computers can add themselves to them.
To create a computer group in the WSUS console
1. On the WSUS console toolbar, click Computers.
2. Under Tasks, click Create a computer group.
3. In Group name, type a name for your new computer group, and then click OK.
To remove a computer group
1. On the WSUS console toolbar, click Computers.
2. In Groups, click the computer group you want to remove.
3. Under Tasks, click Delete the selected group, and then click OK.
Note:
You cannot remove the Unassigned Computers or All Computers group.
Every client computer remains a member of the All Computers group in
addition to any group you assign it to. Client computers are members of the
Unassigned Computers group only until you assign them to a computer
22
group.
Managing Updates
In this section

Updates Overview

Viewing Updates

Approving Updates

Testing Updates

Storing Updates
Updates Overview
Updates are used for patching or providing a full file replacement for software that is
installed on a computer. Every update that is available on Microsoft Update is made up of
two components:

Metadata provides information about the update. For example, metadata supplies
information for the properties of an update, thus enabling you to find out what the
update is useful for. Metadata also includes end-user license agreements (EULAs).
The metadata package downloaded for an update is typically much smaller than the
actual update file package.

Update files are the actual files required to install an update on a computer.
How WSUS Stores Updates
When updates are synchronized to your WSUS server, the metadata and update files are
stored in two separate locations. Metadata is stored in the WSUS database. Update files
can be stored either on your WSUS server or on Microsoft Update servers, depending on
how you have configured your synchronization options. If you choose to store update files
on Microsoft Update servers, only metadata is downloaded at the time of synchronization;
you approve the updates through the WSUS console, and then client computers get the
update files directly from Microsoft Update at the time of installation. For more information
about your options for storing updates, see Deploying Microsoft Windows Server Update
Services at http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
23
Managing Updates by Using WSUS
Whether you have just deployed WSUS or are performing daily tasks, you will be setting
up or (reconfiguring) and running synchronizations, adding computers and computer
groups, and deploying updates on a regular basis. The order in which you perform any of
these general tasks might change, depending on a number of circumstances—for
example, you might change your client computer configurations, (such as adding new
computers, upgrading software).
Although the order you might need to perform the following general tasks might be
different, necessitated by your organizational needs, the following is an example of the
order of general tasks you might undertake in updating computers by using WSUS.
1. Before configuring options in the WSUS console, determine an overall update
management plan based on your network capabilities, company needs, and layout.
Considerations might include the following:

If and how you want to set up a hierarchy of WSUS servers

Which database to use to store update metadata (for example, MSDE, WMSDE,
SQL Server 2000)

What computer groups you want to create, and the method you will use to assign
computers to them (for example, server-side or client-side targeting)

Whether you want updates to synchronize automatically at a specific time
2. Set synchronization options on the Options page, such as update source, product
and update classification, language, connection settings, storage location, and
automatic synchronization schedule.
3. Get the updates and associated metadata on your WSUS server through
synchronization from either Microsoft Update or an upstream WSUS server,
depending on the location you have specified for your update source.
4. Approve or decline updates by group from the Updates page. You can approve
updates for either installation or detection only. For detection only, WSUS does not
install updates but instead checks computers in the groups you specified, to see if a
specific update is needed. To get the result of the detection (or, in other words, to find
out if the update is needed), check the Status of Updates report. You can set a
deadline for automatic installation or detection. For installation, you have the option
of allowing users to install the updates themselves (if they are local administrators on
their client computers).
5. Configure automatic approvals for either installation or detection (by classification
and groups) in Options, on the Automatic Approvals page. If the installation and
detection rules conflict, WSUS will use the installation rule. On this page, you can
24
also configure whether you want to enable automatic approval of revisions to
existing updates or approve revisions manually. If you choose to approve manually,
then your WSUS server will continue using the older version until you manually
approve the revision.
6. Check status of the updates on the Updates page or in the Status of Updates report.
Update Products and Classifications
Updates available on Microsoft Update are differentiated by product (or product family)
and classification.
Products Updated by WSUS
A product is a specific edition of an operating system or application, for example
Microsoft Windows Server 2003, Datacenter Edition. A product family is the base
operating system or application from which the products are derived. An example of a
product family is Microsoft Windows, of which Microsoft Windows Server 2003,
Datacenter Edition is a member. On the Synchronization Options page under Products
and Classifications, products are displayed in a hierarchy, under their product family. At
this location on the WSUS console, you can select the products or product families for
which you want your server to automatically synchronize updates. You can specify many
products at once if they belong to the same product family, because by selecting a parent
check box you also select all items under it. Selecting the child check boxes will not
select the parent check boxes. For every selection, you also are automatically selecting
future releases.
Update Classifications
Update classifications represent the type of update. For any given product or product
family, updates could be available among multiple classifications (for example,
Windows XP family Critical Updates and Security Updates). The following table lists
examples of update classifications.
Update Classification
Description
Connectors
Software components designed to support
connection between software
Critical Updates
Broadly released fixes for specific problems
addressing critical, non-security related
bugs
25
Update Classification
Description
Development Kits
Software to aid the writing of new
applications that usually includes a visual
builder, an editor, and a compiler
Drivers
Software components designed to support
new hardware
Feature Packs
New product functionality usually included
in the next full product release
Guidance
Scripts, sample code, and technical
guidance designed to help in the
deployment and use of a product or
technology
Security Updates
Broadly released fixes for specific products,
addressing security issues
Service Packs
Cumulative sets of all hotfixes, security
updates, critical updates, and updates
created since the release of the product
Service packs might also contain a limited
number of customer requested design
changes or features.
Tools
Utilities or features that aid in
accomplishing a task or set of tasks
Update Rollups
Cumulative set of hotfixes, security
updates, critical updates, and updates
packaged together for easy deployment
A rollup generally targets a specific area,
such as security, or a specific component,
such as Internet Information Services (IIS).
Updates
Broadly released fixes for specific problems
addressing a non-critical, non-security
related bugs
26
Viewing Updates
On the Updates page, you can do the following:

View the list of updates. The list of updates displays updates that have been
synchronized from the update source to your server running Windows Server Update
Services (WSUS) and are available for approval. You can filter the list of updates by
using criteria such as classifications and products, approval status, synchronization
date, and text string. In addition, you can sort the list of updates by clicking the
appropriate column heading in the list of updates title bar

View details, status, and revision history for each update.

Approve updates for installation.

Approve updates for detection.

Decline updates.
To open the Updates page

On the WSUS console toolbar, click Updates.
To view updates
1. On the WSUS console toolbar, click Updates. Updates are displayed in the list of
updates.
2. To sort by additional information, download status, title, classification, release
date, or approval status, click the appropriate column heading.
To filter the list of updates displayed on the Updates page
1. On the WSUS console toolbar, click Updates.
2. Under View, select the appropriate criteria for your filter in the list boxes, and
then click Apply. The list of updates will reflect your chosen criteria. The
Contains Text box, under View, enables you to enter text to search on the
following criteria for an update: Title, Description, and Microsoft Knowledge
Base (KB) article number. Each of these items is a property listed on the
Details tab in the update properties.
To view the properties for an update
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click the update for which you want to view properties.
27
3. In the properties pane, click one of the tabs for the following:

The Details tab displays both general properties (for example, title,
description, and release date) and installation information (for example,
requirements for installation, including whether the update is uninstallable)
about the update. In addition, the Details tab indicates if the update
supersedes or is superseded by another update.

The Status tab displays download, approval, and installation status for the
update by computer group. You can further expand computer groups to see
update status by computer.

The Revisions tab displays revision information about the update, including
general properties about the revision and approval status.
Note:
You can perform this procedure on only one update at a time. If you select
multiple updates, the first update selected will be displayed in the properties
pane.
Approving Updates
After updates have been synchronized to your WSUS server, you must approve them to
initiate a deployment action. When you approve an update, you are essentially telling
WSUS what to do with it (for example, your choices are Install, Detect only, Remove, or
Decline update). When approving an update, you specify a default approval setting for
the All Computers group, and any necessary settings for each computer group in the
Approve Updates dialog box. If you do not approve an update, its approval status
remains Not approved and your WSUS server performs no action for the update. The
exceptions to this are in the Critical Updates and Security Updates classifications,
which by default are automatically approved for detection after they are synchronized.
The Updates page is the central access point in the WSUS console for approving
updates. On the Updates page, you can specify the action you want WSUS to exercise
for the update by computer group. You do this by selecting one of the options under
Tasks. The following provides more information about the different approvals you can
enable on the Updates page.
If your WSUS server is running in replica mode, you will not be able to approve updates
on your WSUS server. For more information about replica mode, see Running in Replica
Mode.
28
Approving Updates for Detection
When you approve an update for detection, the update is not installed. Instead, WSUS
checks whether the update is compliant with or needed by computers in the groups you
specify for the Detect only approval option in the Approve Updates dialog box. The
detection occurs at the scheduled time that the client computer communicates with the
WSUS server. You can see the result of the detection either in the Status of Updates
report or on the Updates page, by clicking the Status tab for a specific update. In either
case, the information you need will appear in the Needed column, which represents the
number of computers that have been detected as needing a particular update. If the client
computer does not need the update, the number in Needed is zero.
By default, Critical Updates and Security Updates are automatically approved for
detection.
To approve updates for detection
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to approve for
detection.
3. Under Update Tasks, click Change approval.
4. In the Approve Updates dialog box, verify that Approval is set to Detect only
for the All Computers group.
5. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, select an approval setting.
Approving Updates for Installation
You can select one or multiple updates; if you select multiple updates, you can approve
them for installation at once; you can also approve installation by computer group. This
would be the Install approval option in the Approve Updates dialog box. In addition,
when you specify this approval action, you can do one of the following:

Use the settings on the client computers to determine when to install updates. When
you select this option, users in the targeted computer group will receive a notification
dialog box and an Automatic Updates icon on their taskbar when updates are ready
to be installed on their computers. They can then install the updates immediately, or
at a later time, by clicking the Automatic Updates icon. If you have configured
Automatic Updates, either by Group Policy or locally, to notify the user before
29
installation, these notifications will be offered to any non-administrator who logs
onto the computer in the targeted computer group.

Set a deadline for automatic installation. When you select this option, you set specific
times and dates to install updates, overriding any settings on the client computers. In
addition, you can specify a past date for the deadline if you want to run an approval
action immediately (that is, when the client computers next contact the WSUS
server).
Important:
You cannot set a deadline for automatic installation for an update if user input is
required (for example, accepting a license agreement or specifying a setting
relevant to the update). If you set a deadline for such an installation
synchronization will fail. To determine whether an update will require user input,
look at the May request user input field in the update properties for an update
displayed on the Updates page. Also check for a message in the Approve
Updates box which says "The selected update requires user input and does
not support and installation deadline."
To approve updates for installation
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to approve for
installation.
3. Under Update Tasks, click Change approval.
4. In the Approve Updates dialog box, verify that Approval is set to Install for the
All Computers group.
5. To specify how and when the update will be installed for computers in the
computer group, next to Deadline, click None, and then click one of the following
options:

If you want to enable users to determine when to install the updates, click
Use client settings to determine update installation time, and then click
OK. If you have configured Automatic Updates, either by domain-based or
local Group Policy, to notify the user before installation, these notifications
will be offered to any non-administrator who logs onto the computer in the
targeted computer group.

If you want the update to be installed automatically, click Install the update
by the selected date and time, specify the date and time of the deadline,
and then click OK. If you want the install to occur immediately (that is, when
30
the client computers next contact the WSUS server), you can specify a past
date for the deadline.
6. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, click an approval setting.
Note:
For more information about downloading and installing updates, see Best
Practices with Windows Server Update Services.
Declining Updates
This option is available as a task under Update Tasks on the Updates page. If you
select this option, the update is removed from the list of available updates. Declined
updates will appear in the updates list only if you select either Declined or All updates in
the Approval list when specifying the filter for the update list under View.
To decline updates
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to decline.
3. In Update Tasks, click Decline update or Decline selected updates,
depending on whether you have selected one or multiple updates to decline.
Approving Updates for Removal
You can approve an update for removal (that is, approve uninstalling the update). This
option is only available if the update supports uninstalling, and you would choose the
Remove approval option in the Approve Updates dialog box. You can specify a
deadline for the update to be uninstalled, as well as specify a past date for the deadline if
you want to run an approval action immediately (that is, when the client computers next
contact the WSUS server).
To approve updates for removal
1. On the WSUS console toolbar, click Updates.
2. In the list of updates, click one or more updates that you want to approve for
removal.
31
3. Under Update Tasks, click Change approval.
4. In the Approve Updates dialog box, verify that Approve is set to Remove for
the All Computers group.
5. If you want to set a deadline for the update(s) to be automatically removed, next
to Deadline, click None, specify the date and time for the deadline, and then
click OK. If you want the update removal to occur immediately (that is, when the
client computers next contact the WSUS server), you can specify a past date for
the deadline.
6. If you want to set a different default approval setting for one or more groups,
under Group approval settings for the selected updates, find the group(s) for
which you want to set the special approval setting, and then, in the Approval
column, click an approval setting.
Approving Updates Automatically
On the Automatic Approval Options page, you can configure your WSUS server to
automatically approve installation or detection for updates and associated metadata
when they are downloaded to the WSUS server during synchronization. This is different
from approving updates on the Updates page, where, by default, updates are approved
for detection.
You can configure automatic approval for updates by update classifications and groups. If
the installation and detection rules you set conflict, your WSUS server will follow the
installation rules.
On the Automatic Approval Options page, you can also select an option to
automatically approve revisions to existing updates as they become available. This option
is selected by default. A revision is a version of an update that has had changes made to
it (for example, it might have expired, or UI text, the EULA, or applicability rules for
computers might have changed). If you do not choose to automatically approve the
revised version of an update, WSUS will use the older version, and you must manually
approve the update revision.
Automatically Approving Updates for Detection
When you select this option, you can create a rule that your WSUS server will
automatically apply during synchronization. For the rule, you specify what updates you
want to automatically approve for detection, by update classification and by computer
group. This applies only to new updates, as opposed to revised updates. This setting is
available on the Automatic Approval Options page.
32
On this page, you can also set a rule for automatically approving updates for
installation. In the event that rules conflict (for example, you have specified the same
update classification and same computer group combination in both the rule to
automatically approve for detection and automatically approve for installation), then your
WSUS server applies the rule to automatically approve for installation.
To automatically approve updates for detection
1. On the WSUS console toolbar, click Options, and then click Automatic
Approval Options.
2. In Updates, under Approve for Detection, select the Automatically approve
updates for detection by using the following rule check box (if it is not
already selected).
3. If you want to specify update classifications to automatically approve during
synchronization, do the following:

Next to Classifications, click Add/Remove Classifications.

In the Add/Remove Classifications dialog box, select the update
classifications that you want to automatically approve, and then click OK.
4. If you want to specify the computer groups for which to automatically approve
updates during synchronization:

Next to Computer groups, click Add/Remove Computer Groups.

In the Add/Remove Computer Groups dialog box, select the computer
groups for which you want to automatically approve updates, and then click
OK.
5. Under Tasks, click Save settings, and then click OK.
Automatically Approve Updates for Installation
When you select this option, you can create a rule that your WSUS server will
automatically apply during synchronization. For the rule, you specify what updates you
want to automatically approve for installation, by update classification and by computer
group. This applies only to new updates, as opposed to revised updates. This setting is
available on the Automatic Approval Options page.
On this page, you can also set a rule for automatically approving updates for detection. In
the event that rules conflict (for example, you have specified the same update
classification and same computer group combination in both the rule to automatically
33
approve for installation and automatically approve for detection), then your WSUS
server applies the rule to automatically approve for installation.
To automatically approve updates installation
1. On the WSUS console toolbar, click Options, and then click Automatic
Approval Options.
2. In Updates, under Approve for Installation, select the Automatically approve
updates for installation by using the following rule check box (if it is not
already selected).
3. If you want to specify update classifications to automatically approve during
synchronization, do the following:

Next to Classifications, click Add/Remove Classifications.

In the Add/Remove Classifications dialog box, select the update
classifications that you want to automatically approve, and then click OK.
4. If you want to specify the computer groups for which to automatically approve
updates during synchronization:

Next to Computer groups, click Add/Remove Computer Groups.

In the Add/Remove Computer Groups dialog box, select the computer
groups for which you want to automatically approve updates, and then click
OK.
5. Under Tasks, click Save settings, and then click OK.
Automatically Approving Revisions to Updates
The Automatic Approval Options page contains an option to automatically approve
revisions to existing updates as they become available. This option is selected by default.
A revision is a version of an update that has changes (for example, it might have expired,
or have an updated EULA, UI text, or applicability rules for computers). If you configure
your WSUS server to automatically approve new revisions of an update but an expired
revision for the update is synchronized, your WSUS server will automatically decline the
update. If you choose not to automatically approve the revised version of an update, your
WSUS server will use the older revision, and you must manually approve the update
revision.
To automatically approve revisions to updates
1. On the WSUS console toolbar, click Options, and then click Automatic
34
Approval Options.
2. Under Revisions to Updates, click Automatically approve the latest revision
of the update.
3. Under Tasks, click Save settings, and then click OK.
Approving Superseding or Superseded Updates
Typically, an update that supersedes other updates does one or more of the following:

Enhances, improves, and/or adds to the fix provided by one or more previously
released updates.

Improves the efficiency of its update file package, which is installed on client
computers if the update is approved for installation. For example, the superseded
update might contain files that are no longer relevant to the fix, or to the operating
systems now supported by the new update, so those files are not included in the
superseding update's file package.

Updates newer versions of operating systems. It is also important to note that the
superseding update might not support earlier versions of operating systems.
Conversely, an update that is superseded by another update does the following:

Fixes a similar vulnerability to the update that supersedes it. However, the update
that supersedes it might enhance the fix that the superseded update provides.

Updates earlier versions of operating systems—in some cases these versions of
operating systems are no longer updated by the superseding update.
In the list of updates on the Updates page, an icon next to the update indicates that it
has a supersedure relationship to another update. The Details tab in the properties for
the update tells you whether the update supersedes or is superseded by another update.
In addition, you can determine which updates supersede or are superseded by the
update by looking at the Supersedes and Superseded by entries. The properties box for
the update is available at various locations in the WSUS console (for example, on the
Updates page, on the Computers page).
WSUS does not automatically decline superseded updates, and it is recommended that
you do not assume that superseded updates should be declined in favor of the new,
superseding update. Before declining a superseded update, make sure that it is no longer
needed by any of your client computers. Following are examples of scenarios where you
might need to install a superseded update:

If a superseding update supports only newer versions of an operating system, and
some of your client computers run earlier versions of the operating system.
35

If a superseding update has more restricted applicability than the update it
supersedes, which would make it inappropriate for some client computers.

If an update no longer supersedes a previously released update due to new changes.
It is possible that through changes at each release, an update no longer supersedes
an update it previously superseded in an earlier version. In this scenario, you will still
see a message on the Details tab for the superseded update that it has been
superseded, even though the update that supersedes it has been replaced by an
update that does not.
Recommended Process for Approving a Superseding Update
Because a superseding update typically enhances a fix provided by a previously
released, superseded update, it is recommended that you first see how many client
computers will be compliant with the new update, and work backward from there. Use the
following process.
To approve a superseding update
1. Approve the superseding update for Install on all computers where the fix
provided by the update is appropriate.
2. Check the resulting status of the approval action on your computers. Note which
computers show status as Not needed for the update, and then compare the
properties of those computers with the properties of the update.
3. Use the information available in the update properties to help you determine
which previously released version of the updates are available. For example,
look under Supersedes on the Details tab, and check the Description and KB
article number entries if appropriate.
4. Get information about the superseded, previously released versions of the
updates; for example, view their properties.
5. When you find a superseded update that seems appropriate for the remaining
client computers, approve the update for installation.
6. Repeat this process until all of your client computers are updated with the
intended fix.
Approving Office Updates
If you use WSUS to update Microsoft Office on your network computers, consider the
following:
36

If you have purchased a "per user" license agreement for Office, you must ensure
that each user's installation of Office is updated (for example, there might be two
users who run individually licensed copies of Microsoft Office on the same computer).
This means a particular user has to be logged on to the computer for that specific
copy of Office to be updated. For example, if two people both have accounts on a
computer that is running Microsoft Office, then each of them has to log on and update
his or her Office installation, otherwise one of them will not have an updated version
of Office.

Users can access the public Microsoft Office Online Web site and can look for
updates to their Office installation through the Microsoft Office Update wizard. Using
Group Policy, you might want to create policies that prevent users from getting their
own Office updates from Microsoft Office Online.

Unlike Windows Update or Microsoft Office Online, which are public Web sites that
users can visit directly, Microsoft Update is accessed only by WSUS servers. It is
currently in beta release and makes security updates available only for Office XP and
Office 2003. Some critical updates are not available through Microsoft Update.
Therefore, some updates might appear on the Microsoft Office Online Web site that
are not available on Microsoft Update.
Approving SQL Server and Exchange Server Updates
Updating Microsoft SQL Server Instances
Your installations (instances) of Microsoft SQL Server on one computer can possibly get
complex, because you can enable any of the following SQL Server scenarios:

Multiple instances of SQL server on the computer at the same time

Multiple versions (releases) of SQL

SQL Server instances in multiple languages on the same computer

Typically, there is nothing extra you have to do to update these multiple instances,
you just need to make sure that when you specify your synchronization options (for
example, product, update classifications, and language options) you account for
requirements for the versions of the SQL Server instances you have on the
computer. For more information about configuring synchronization options, see
Setting Up and Running Synchronizations.
Updating Microsoft SQL Server and Microsoft Exchange Servers that are Part of a
Cluster
Both Microsoft SQL Server and Microsoft Exchange Server can be installed in a clustered
environment. If there is an update available for servers in a cluster that are running these
37
programs, each server in the cluster must be updated individually. Microsoft
recommends that you install updates in sequence of the cluster configuration. For
example, you would first update the active cluster node, then initiate a fail-over and make
the next passive cluster node active to update it, and so on until all cluster nodes are
updated.
Note:
You can have both a stand-alone instance and a cluster instance of SQL Server
on the same server. If you are updating the active cluster node in this scenario,
the stand-alone instance of SQL Server on the same server will also be updated
if you have specified the correct synchronization options (product, update
classification, and language). For more information about setting synchronization
options, see Setting Up and Running Synchronizations.
Testing Updates
Until you install an update, you cannot be certain about the impact it will have on the
existing code running on your systems. By installing an update in a test environment
before deploying it to your production environment, you can analyze and assess its
impact before it has the opportunity to harm your production systems. This can prevent
unplanned downtime and lost productivity.
WSUS enables you to create custom computer groups, which you can use to test
updates. For example, the following figure depicts three computer groups: two custom
groups created by the administrator (Test and Accounting), as well as the built-in All
Computers group.
In this example, the Test group contains a small number of computers representative of
all the computers contained in the Accounting group. This creates a virtual test lab. The
administrator can first approve updates for the Test group. If the testing goes well, the
administrator can roll out the updates to the Accounting group.
38
You can expand this basic scenario to fit testing needs for your organization. For
example, you can create multiple test computer groups that resemble actual computer
groups containing computers with different configurations.
Storing Updates
In this section

Specifying Where to Store Updates

Managing the Databases
Specifying Where to Store Updates
You can specify whether you want to store update files on your local WSUS server or on
Microsoft Update. If you choose to store the updates locally, you can limit the updates
downloaded to your server by language. If you choose to store the update files on
Microsoft Update, then your WSUS server obtains only update information (metadata) for
the criteria you have specified on the Synchronization Options page. In this scenario,
the update files come directly from Microsoft Update and are downloaded at the time of
installation on the client computers receiving updates. You will need to make sure your
client computers have direct access to Microsoft Update in this scenario.
Local Storage Considerations
If you decide to store update files on your server, the recommended minimum disk size is
30 GB. However, depending on the synchronization options you specify, you might need
to use a larger disk. For example, when specifying advanced synchronization options, as
39
in the following procedure, if you select options to download multiple languages and/or
the option to download express installation files, your server disk can easily reach 30 GB.
Therefore if you choose any of these options, install a larger disk (for example, 100 GB).
If your disk gets full, you can install a new, larger disk and then move the update files to
the new location. To do this, after you create the new disk drive, you will need to run the
WSUSutil.exe tool (with the movecontent command) to move the update files to the new
disk. For this procedure, see Managing WSUS from the Command Line.
About Express Installation Files
Express installation files download in a package that is usually multiple times larger than
a regular update package. The express installation file package contains the different
versions of the update that will apply to specific client computer configurations. If you
select this option, the package containing all multiple versions of update files is
downloaded to your WSUS server. However, when your client computers connect to the
server, they will download only the update files they need, which are the files that are
compliant for the specific computer. You might have selected the express installation file
option if you are less concerned with external bandwidth than internal bandwidth usage.
Besides bandwidth, another consideration when choosing to download express
installation files, as mentioned earlier, is disk space. If you choose to download express
installation files, they will take more disk space. Therefore, use a larger disk (more than
30 GB) if you select this option.
The option to download and store express installation files is in covered in step 3 in the
following procedure.
To specify where to store downloaded update files
1. On the WSUS console toolbar, click Options, and then click Synchronization
Options.
2. Under Update Files and Languages, click Advanced.
3. Under Update Files, select whether to store update files on the server running
Windows Server Update Services (WSUS) or on Microsoft Update. If you choose
to store update files on your server, you can choose either to download update
files only when they are approved, or to download express installation files.
4. If you selected to store the files on the WSUS server, under Languages, select
whether you want to limit the updates downloaded to your WSUS server by
language, and then click OK. Note that if you select to download all languages
(which is selected by default) that this will take more disk space. If possible,
consider limiting the languages you download if you are also choosing to store
40
update files on your WSUS server.
5. In Tasks, click Save settings, and then click OK.
Note:
If your WSUS server is running in replica mode, you will not be able to
perform this task. For more information about replica mode, see Running in
Replica Mode.
Changing the Location where You Store Update Files Locally
You might need to change the location where WSUS stores updates locally. This might
be required if the disk becomes full and there is no longer any room for new updates. You
might also have to do this if the disk where updates are stored fails and the replacement
disk uses a new drive letter.
You accomplish this move with the movecontent command of WSUSutil.exe, a
command-line tool that is copied to the file system of the WSUS server during WSUS
Setup. By default, Setup copies WSUSutil.exe to the following location:
WSUSInstallationDrive:\Program Files\Microsoft Windows Server Update Services\Tools\
You must be a member of the local Administrators group on the WSUS server to use the
movecontent command of WSUSutil.exe. These operations can only be run from the
WSUS server itself, which must be a 32-bit platform.
You must create the new path for local WSUS update storage prior to using
WSUSutil.exe. The movecontent command takes an optional -skipcopy parameter. The
-skipcopy parameter enables you to change the location of local WSUS update storage
without copying any files. For more information about WSUSutil.exe, see Deploying
Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
To change the location of local WSUS update storage
1. Click Start, and then click Run.
2. In the Open box, type cmd, and then click OK.
3. At the command prompt, navigate to the directory that contains WSUSutil.exe.
4. Type the following, and then press ENTER:
wsusutil.exe movecontent contentpath logfile [-skipcopy]
For example, type:
wsusutil.exe movecontent D:\WSUS1\ D:\move.log
41
where D:\WSUS1 is the new path for local WSUS update storage, and
D:\move.log is the path to the log file.
Note:
If you do not want to use WSUSutil.exe to change the location of local WSUS
update storage, you can also use NTFS functionality to add a partition to the
current location of local WSUS update storage. For more information about
NTFS, go to Help and Support Center in Windows Server 2003.
Managing the Databases
The WSUS database is a required component of WSUS (which is configured during
setup) that stores the following types of information:

WSUS server configuration information

Metadata that describes what each update is useful for
Aside from the actual update files, the metadata is the second part of every update
available on Microsoft Update. Update files are stored separately, either on Microsoft
Update, or on your WSUS server. For more information, see Specifying Where to Store
Updates.

Information about client computers, updates, and client interaction with updates
Depending on your server and network configurations, you are running an MSDE,
WMSDE, or SQL Server 2000 database for your WSUS installation (for more information
about your database options when installing WSUS, see "Choose the Database Used for
WSUS" in Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
The following table describes non-deployment tasks you might have to perform as part of
regular operations.
42
Database management tasks
Database
Tasks
MSDE

Make space in the database when the
2-GB limit is reached. For more
information, see Managing WSUS from
the Command Line.

Backup / restore. For more information,
see Backing Up Windows Server
Update Services.

Move data to a SQL Server 2000
database (for example, if you are
upgrading the database from MSDE to
SQL Server 2000).

Backup / restore. For more information,
see Backing Up Windows Server
Update Services.

Move data to a SQL Server 2000
database (for example, if you are
upgrading the database from WMSDE
to SQL Server 2000). See

Backup / restore.

Move data to another SQL Server 2000
database (for example, if you move
WSUS to another server and you will
again use SQL Server 2000 for the
database).
WMSDE
SQL Server 2000
Running in Replica Mode
A WSUS server running in replica mode inherits the update approvals and computer
groups created on an administration server. In a scenario that uses replica mode, you
typically have a single administration server, and one or more subordinate replica WSUS
servers spread out throughout the organization, based on site or organizational
topography. You approve updates and create computer groups on the administration
43
server, which the replica mode servers will then mirror. Replica mode servers can be
set up only during WSUS Setup, and if you implemented this scenario, it is likely because
it is important in your organization that update approvals and computer groups are
managed centrally.
If your WSUS server is running in replica mode, you will be able to perform only limited
administration capabilities on the server, which will primarily consist of:

Adding and removing computers from computer groups

Computer group membership is not distributed to replica servers, only the computer
groups themselves. Therefore, on a replica mode server, you will inherit the computer
groups that you created on the administration server. However, the computer groups
will be empty. You must then assign the client computers that connect to the replica
server to the computer groups.

Setting a synchronization schedule

Specifying proxy-server settings

Specifying the update source

This can be a server other than the administration server.

Viewing available updates

Monitoring update, synchronization, and computer status, and monitoring WSUS
settings on the server

All standard WSUS reports are available on replica mode servers.
For more information about setting up and running in replica mode, see Deploying
Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Backing Up Windows Server Update Services
Although WSUS does not provide a built-in backup tool, you can use the Backup Utility
that is available on all servers running Windows 2000 or Windows Server 2003 to easily
back up and restore both the WSUS database and update file storage folder. The Backup
Utility is also known as Ntbackup.exe.
Backing up WSUS involves backing up the following:

The WSUS database, which contains:

Update metadata, including information about updates (for example, properties).
Metadata is also where EULAs are stored.
44


WSUS server configuration information, which includes all settings for your
WSUS server (that is, options you specified through the WSUS console and
settings configured by WSUS automatically during setup).

Information about client computers, updates, and client interaction with updates.
You can access this information through the WSUS console when you view
status and run reports on update status and client computer status.
The folder where the update files are stored. Update files are the actual files required
to install an update on a computer. By default, update files are stored in the
%systemdrive%\WSUS\WSUSContent folder on your WSUS server. If you have
chosen to store update files on Microsoft Update (either during setup or on the
Options page), you do not have to back up the update file storage folder on your
WSUS server.
If you are using a full version of Microsoft SQL Server 2000 for your database, which is
not installed by WSUS, you can use SQL Server Enterprise manager as an alternative to
the Backup Utility. For more information about SQL Server Enterprise Manager, refer to
your SQL Server documentation. For more information about database options and
configurations for WSUS, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
To back up the update file storage folder
1. On your WSUS server, click Start, and then click Run.
2. In the Open box, type %systemdrive%\%windir%\system32\ntbackup.exe and
then click OK.
3. In the Backup or Restore Wizard, click Next.
4. Verify that Back up files and settings is selected, and then click Next.
5. Click Let me choose what to back up, and then click Next.
6. Select the WSUSContent folder (under %systemdrive%\WSUS\), and then click
Next.
7. Use the Browse button to choose a place to save your backup, type a name for
the backup, and then click Next.
8. If you want to set additional specifications for your backup, including whether it
will be an incremental backup, whether you want to verify the backup, set a
recurring schedule for the backup, or other options, click Advanced, and then
follow the instructions in the wizard.
9. When the wizard is finished, click Finish.
45
10. When the message appears that informs you that the backup is complete, click
Close.
To back up the WSUS database
1. On your WSUS server, click Start, and then click Run.
2. In the Open box, type %systemdrive%\%windir%\system32\ntbackup.exe and
then click OK.
3. In the Backup or Restore Wizard, click Next.
4. Verify that Back up files and settings is selected, and then click Next.
5. Click Let me choose what to back up, and then click Next.
6. Under %systemdrive%\WSUS\MSSQL$WSUS\, select the Data and LOG
folders, and then click Next.
7. Use the Browse button to choose a place to save your backup, type a name for
the backup, and then click Next.
8. If you want to set additional specifications for your backup, including whether it
will be an incremental backup, whether you want to verify the backup, set a
recurring schedule for the backup, or other options, click Advanced, and then
follow the prompts that appear in the wizard.
9. When the wizard is finished, click Finish.
10. When the message appears that informs you that the backup is complete, click
Close.
To restore the update file storage folder
1. On your WSUS server, click Start, and then click Run.
2. In the Open box, type %systemdrive%\%windir%\system32\ntbackup.exe and
then click OK.
3. In the Backup or Restore Wizard, click Next.
4. Click Restore files and settings, and then click Next.
5. In the What to restore dialog box, under Items to restore, expand the file that
contains the WSUSContent folder (under %systemdrive%\WSUS\), and then
click Next.

Alternatively, you can select a subset of the
%systemdrive%\WSUS\WSUSContent folder to restore. Within the
46
%systemdrive%\WSUS\WSUSContent folder, you can restore one, all, or a
combination of its subfolders and files.
6. If you want to set additional specifications for your restore, including whether you
want to restore the files or folders to a different location, replace existing files,
restore security settings, or specify other options, click Advanced, and then
follow the instructions in the wizard.
7. When the wizard is finished, click Finish.
8. When the message appears that informs you that restoring is complete, click
Close.
To restore the WSUS database
1. On your WSUS server, click Start, and then click Run.
2. In the Open box, type %systemdrive%\%windir%\system32\ntbackup.exe and
then click OK.
3. In the Backup or Restore Wizard, click Next.
4. Click Restore files and settings, and then click Next.
5. In the What to restore dialog box, under Items to restore, expand the file that
contains the Data and LOG folders (under
%systemdrive%\WSUS\MSQL$WSUS), and then click Next.

Alternatively, you can select a subset of the
%systemdrive%\WSUS\MSQL$WSUS\Data or
%systemdrive%\WSUS\MSQL$WSUS\LOG folders to restore. Within the
%systemdrive%\WSUS\MSQL$WSUS\Data and
%systemdrive%\WSUS\MSQL$WSUS\LOG folders, you can restore one, all,
or a combination of their subfolders and files.
6. If you want to set additional specifications for your restore, including whether you
want to restore the files or folders to a different location, replace existing files,
restore security settings, or specify other options, click Advanced, and then
follow the instructions in the wizard.
7. When the wizard is finished, click Finish.
8. When the message appears that informs you that restoring is complete, click
Close.
47
Best Practices with Windows Server Update Services
This section provides best practices for managing updates through WSUS.
Use Group Policy to Update Multiple Computers
If you have set up Active Directory in your network, you can configure one or multiple
computers simultaneously, by including them in a Group Policy object (GPO), and then
configuring that GPO with WSUS settings. Microsoft recommends that you create a new
Group Policy object (GPO) that contains only WSUS settings. Link this WSUS GPO to an
Active Directory container appropriate for your environment. In a simple environment, you
might link a single WSUS GPO to the domain. In a more complex environment, you might
link multiple WSUS GPOs to several organizational units (OUs), which will enable you to
apply different WSUS policy settings to different types of computers.
Important:
Microsoft recommends that you do not edit the Default Domain or Default
Domain Controller GPOs.
Typically, when you configure WSUS through Group Policy (in an Active Directory
network environment), you set up your client computers to connect to a WSUS server
and download updates once a day. By default, this is every 22 hours (minus a random
time offset, described later in this topic) at which time the approval actions you specified
for the new updates (for example, installation, detection, or removal) run on the client
computer.
However, if you are aware of and want to protect computers against immediate security
threats, you might want to set up more a more frequent schedule for computers to
contact the WSUS server, download, and install updates.
To specify how and when computers are updated through Group Policy
1. In Group Policy Object Editor, expand Computer Configuration, expand
Administrative Templates, expand Windows Components, and then click
Windows Update.
2. In the details pane of Group Policy Object Editor, configure the appropriate
policies. See the following table for examples of the policies you might want to
set.
48
Policies for Configuring Automatic Updates Behavior
Policy
Description
Configure Automatic Updates
By enabling this setting you enable your
computer to receive updates through
Automatic Updates on a computer or
computer group. To complete this setting,
you must then select one of the following
four options:
No auto-restart for scheduled Automatic
Updates installations

Notify before downloading any updates
and notify again before installing them.

Download the updates automatically
and notify when they are ready to be
installed (default setting)

Automatically download updates and
install them on the schedule specified
below

Allow local administrators to select the
configuration mode that Automatic
Updates should notify and install
updates
Specifies that to complete a scheduled
installation, Automatic Updates will wait for
the computer to be restarted by any user
who is logged on, instead of causing the
computer to restart automatically.
49
Policy
Description
Automatic Updates detection frequency
Configures the frequency with which
computers contact the WSUS server. The
exact time between contact will actually be
the number of hours you specify here,
minus zero to twenty percent of the hours
specified. For example, if this policy is used
to specify a 20-hour contact frequency, then
all client computers to which this policy is
applied will check for updates anywhere
between 16 and 20 hours. If you leave this
policy set to Disabled or Not Configured,
Windows will check for available updates at
the default interval of 22 hours.
Allow Automatic Updates immediate
installation
Specifies whether Automatic Updates
should automatically install certain updates
that neither interrupt Windows services nor
restart Windows.
It will take a few minutes before the new policies you have configured take effect. It will
be about 20 minutes after Group Policy refreshes (applies any new settings to the client
computer). By default, computer Group Policy refreshes in the background every 90
minutes, with a random offset of 0 to 30 minutes. If you want to refresh Group Policy
sooner, you can go to a command prompt on the client computer and type:
gpupdate /force.
For more information about Group Policy, see Group Policy at
http://go.microsoft.com/fwlink/?LinkID=14232. For more information about options for
setting up and configuring your client computers in both Active Directory and non-Active
Directory network environments, see Deploying Microsoft Windows Server Update
Services at http://go.microsoft.com/fwlink/?LinkID=41777.
Schedule Update Installations when there is Little Chance for Lost
Productivity
In managing the process of updating computers (which includes WSUS servers), one of
your main goals is to have any planned downtime occur when there is little chance for
lost productivity. The following are suggestions for accomplishing this:
50

To update WSUS servers or specific computers efficiently, put the WSUS servers
or computers in their own computer group, and deploy to that group with a deadline
set for a time when it is feasible for the WSUS servers or computers to be down (for
example, on Sunday at 3:00 A.M).

Deploy updates by using a deadline in the future. For example, set the WSUS
servers or computers with a scheduled installation at a time when it is feasible for
them to be briefly offline (for example, on Sunday at 3:00 A.M).

Configure client computers or WSUS servers through Group Policy to immediately
install updates that do not require a restart. (Before you approve an update for
installation, you can read the Description field in the properties for an update in
order to determine whether the update will require restarting the computer. You can
view the properties for an update by selecting it in the list of updates on the Updates
page in the WSUS console.) Enable the policy to install immediately any updates that
do not require a computer restart, so that they are installed every day. Computers
can then install any updates that do not interrupt service when they are ready to
install (that is, scheduling for Sunday morning installation would be unnecessary).
The tile of this policy is Allow Automatic Updates immediate installation (see the
table earlier in this topic for more information).
For maximum control over when your servers are restarted as
necessitated by an update installation, set Group Policy to Download
the updates automatically and notify when they are ready to be
installed, and then create a script that enables to you accept and
install the updates and then restart the computer on demand
Some updates require a computer restart after they are installed (and, by default, will
restart computers 5 minutes after they are installed.) By not restarting your servers after
installing these updates, you leave them at risk. [benag] However, depending on your
network configuration, it might also risky to restart your servers automatically, since many
other resources in your network could depend on a single server. In this case, it might not
be feasible to schedule automatic scheduled restarts of your server.
There are a couple of Group Policies that enable you to configure when a computer is
restarted. However, when talking about servers, these policies have some limitations
over control:

No auto-restart for scheduled Automatic Updates installations—this policy will
prevent automatic restarts of your server, and will enable manual restart—however,
you have to log on to the server and then initiate the restart. This might not be
practical if your server is typically unattended.
51

Delay restart for scheduled installations—this policy can delay the time between
the update installation and the computer restart, however, the maximum time you can
set here is 30 minutes.
If these are issues for you, consider the following procedure:
1. Use Group Policy to configure automatic download, and manual installation of the
updates. To do this, you would enable the Configure Automatic Updates Group
Policy setting by selecting the Download the updates automatically and notify when
they are ready to be installed option.
2. Create a script to automate installing the updates and then restarting of your server.
This script would have the effect of a “button” you would push to initiate all this,
therefore the updates install and the server restarts when you run the script. You can
do this at the most appropriate time. For more information about creating scripts to
automate Automatic Updates tasks (for example downloading and installing updates
on server and client computers), see Windows Update Agent Software Developer's
Kit (http://go.microsoft.com/fwlink/?LinkID=43101)
Managing WSUS from the Command Line
This topic does the following

Summarizes the purpose and functionality of WSUSutil.exe and its parameters.

Provides and defines the syntax you would use to run specific tasks.

Links to "Deploying Microsoft Windows Server Update Services" where more
information (for example, scenarios) is available.
Running WSUSutil.exe
WSUSutil.exe is a tool that you can use to manage your WSUS server from the
command line. WSUSutil.exe is located in the %drive%\Program Files\Update
Services\Tools folder on your WSUS server. You can run specific commands with
WSUSutil.exe to perform specific functions, as summarized in the following table. The
syntax you would use to run WSUSutil.exe with specific commands follows the table.
52
Summary of Commands You Can Use with WSUSutil
Command
What it enables you to
When you might use it
do
export
The first of the two
parts that make up
the export / import
process.

On an ongoing basis, if you
are running a network with
limited or restricted Internet
connectivity

On an ongoing basis, if you
are running a network with
limited or restricted
connectivity
The export
command enables
you to export update
metadata to an
export package file.
You cannot use this
parameter to export
update files, update
approvals, or server
settings.
import
The second of the
two parts that make
up the export/import
process.
The import
command imports
update metadata to a
server from an export
package file created
on another WSUS
server. This
synchronizes the
destination WSUS
server without using
a network
connection.
53
Command
What it enables you to
When you might use it
do
migratesus
This command
migrates update
approvals from a
SUS 1.0 server to a
WSUS server.

If you are upgrading your
implementation SUS 1.0 to
WSUS.
movecontent
Changes the file
system location
where the WSUS
server stores update
files, and optionally
copies any update
files from the old
location to the new
location

Hard drive is full

Disk fails
reset
deleteunneededrevisions
Checks that every

update metadata row
in the database has

corresponding update
files stored in the file
system. If update files
are missing or have
been corrupted,
WSUS downloads
the update files
again.
Purges the update
metadata for
unnecessary update
revisions from the
database.

After restoring the WSUS
database.
When troubleshooting
To free up space when an
MSDE is full
54
Command
What it enables you to
When you might use it
do
listinactiveapprovals
Returns a list of
update titles with
approvals that are in
a permanently
inactive state
because of a change
in server language
settings.

When you change
language settings on an
upstream server (that is the
parent to a replica server)
and want to see which
updates are no longer
active because they are not
in the new languages you
have specified. You can
run this command if you
want to see a list of inactive
approvals (for example, to
help you decide if you want
to remove the inactive
approvals). You do not
have to run this command
before running the
removeinactiveapprovals
command.
removeinactiveapprovals
Removes approvals
for updates that are
in a permanently
inactive state
because of a change
in WSUS server
language settings.

When you change
language settings on an
upstream server (that is the
parent to a replica server)
and want to remove
updates that are no longer
active because they are not
in the new languages you
have specified. This would
fix the resulting mismatch
in the number of updates
displayed on the parent
and replica servers in this
scenario. You do not have
to run the
listinactiveapprovals
command before running
this command.
55
Export
For background and procedural information about exporting and importing updates, see
"Set Up a Disconnected Network (Import and Export Updates)" in Deploying Microsoft
Windows Server Update Services at http://go.microsoft.com/fwlink/?linkid=41777.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil export package logfile
The parameters are defined in the following table.
Parameter
Definition
package
The path and file name of the package .cab
to create.
logfile
The path and file name of the log file to
create.
/help or /?
Displays command-line help for export
command.
Import
For background and procedural information about exporting and importing updates, see
"Set Up a Disconnected Network (Import and Export Updates)" in Deploying Microsoft
Windows Server Update Services at http://go.microsoft.com/fwlink/?linkid=41777.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil import package logfile
The parameters are defined in the following table:
Parameter
Definition
package
The path and file name of the package .cab
to import.
56
Parameter
Definition
logfile
The path and file name of the log file to
create.
/help or /?
Displays command-line help for import
command.
Migratesus
SUS 1.0 to WSUS migration scenarios and related procedures are covered extensively in
the "Migrate from a SUS Server to a WSUS Server" topic in Deploying Microsoft
Windows Update Services at http://go.microsoft.com/fwlink/?LinkID=41777.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil migratesus [/content contentshare] [/approvals servername [computergroup]]
[/log logfile] [/?]
The parameters are defined in the following table:
Parameter
Definition
/content contentshare
Migrates content from a SUS 1.0, where
contentshare is the path to the folder that
contains SUS 1.0 content.
/approvals servername
Migrates approvals from the SUS 1.0
server, where servername is the name of
the SUS 1.0 server.
computergroup
Computer group for which you want to
apply the approvals.
/help or /?
Displays command-line help for the
migratesus parameter.
/log logfile
File in which migration activities are
logged.
Movecontent
When you run this command, WSUSutil.exe does the following:
57

Copies the update files from the old location into the new location.

Updates the WSUS database to refer to the new location of the update files.
The destination folder where update files are moved to must be on an NTFS partition.
The content move tool will not try to copy update files if they already exist in the
destination folder. WSUSutil.exe sets the same permissions on the destination folder that
were set on the original folder.
Note:
You can use xcopy, the Backup utility, or other non-WSUS specific methods to
copy update files from the old location into the new one. If you copy the files by
using a method other than WSUSutil.exe, you still need to run WSUSutil.exe to
perform the second part of the move. In this case you would use the skipcopy
parameter when running WSUSutil.exe. See "Syntax" below for more
information.
There are two scenarios in which you might move update files from one WSUS drive to
another:

If the drive is full

If the hard disk fails
If the drive is full
If the drive where WSUS stores update files is full, you can do one of the following:

Add more space to your current drive by using NTFS functionality. This is done
without using WSUSutil.exe. This method does not affect WSUS configuration or
operation.

Install a new drive, and then move the update files from the old drive to the new
location by using Wsusutil.exe.
If the hard disk fails
If the hard disk that stores update files fails, you must do the following:
1. Install the new disk on your computer, and then restore the update files from your
backup files. Note: If you have not backed up your update files, WSUSutil.exe
downloads the missing files at the end of the content move operation.
2. Run the content move operation, specifying the location for the new disk. In addition,
you specify the skipcopy parameter, because you are either putting the files in the
new folder through the Backup utility or the source folder does not exist; the update
files will be downloaded at the end of this process.
58
3. When the move operation is complete, all the missing files are downloaded.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil movecontent contentpath logfile -skipcopy [/?]
The parameters are defined in the following table.
Parameter
Definition
contentpath
The new root for content files. The path
must exist.
logfile
The path and file name of the log file to
create.
-skipcopy
Indicates that only the server configuration
should be changed, and that the content
files should not be copied.
/help or /?
Displays command-line help for
movecontent command.
Reset
You use this command if you store updates locally on your WSUS server and want to
ensure that the metadata information stored in your WSUS database is accurate. With
this command, you verify that every update metadata row in the WSUS database
corresponds to update files stored in the local update file storage location on your WSUS
server. If update files are missing or have been corrupted, WSUS downloads the update
files again. This command might be useful to run after you restore your database, or as a
first step when troubleshooting update approvals.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil reset
Deleteunneededrevisions
If you use an MSDE database in your WSUS implementation (for example, if you are
using WSUS on a server running Windows 2000), you might need to run this command
periodically when the database reaches its 2-GB limit because once the database is full,
59
you cannot synchronize new updates to your server, add new computers, or import
events from existing client computers.
With regular use, it is possible that the 2 GB will be reached quickly, as updates can be
very large, and update publishers typically create multiple revisions of each update,
which your server will synchronize automatically for the products and update
classifications you specify. In addition, event information for client computers also
populates the database. When your MSDE database is close to reaching its limit, you will
receive a notification on the WSUS console Home page alerting you to run this command
soon. When you run this command, unneeded revisions and the events associated with
those revisions are deleted from the database.
Unneeded revisions are revisions to software or drivers updates that have not been
deployed to a computer group in at least one month; they are also the latest revisions to
expired driver updates that have not been deployed to a computer group for at least one
month. The one-month time period in both of these cases can be changed, indirectly. It
automatically gets reduced by 7 to 15 days if you reduce the size of a database that is
larger than 1 GB by less than 25 percent in the process of running this command.
Note:
For more information about the databases you can use with WSUS, see the
"Choose the Database Used for WSUS" topic in Deploying Microsoft Windows
Update Services at http://go.microsoft.com/fwlink/?LinkID=41777.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil deleteunneededrevisions
Important:
Before running this command, you must stop the World Wide Web publishing
service in IIS. You must restart it only after you have finished running this
command. To stop or start the IIS service, open IIS, navigate to and then rightclick the Web site where WSUS is is installed (by default this is the Default Web
Site), and then click Stop or Start.
Listinactiveapprovals
If you change language options on an upstream WSUS server, you can create a situation
where the number of updates approved on a parent upstream server does not match the
number of approved updates on a replica server.
Here is a scenario where this might occur:
60
You have configured your upstream parent server to synchronize from Microsoft
Update and have left the language setting set to All Languages (the default). You then
run synchronization and approve 300 updates, of which 50 are not English language
updates. You then change the language setting on the server to English only. After this,
a replica server synchronizes from the parent upstream server and downloads only the
"active" approvals, which now are only the English language ones (replica servers always
only synchronize active approvals). At this point, if you look on the WSUS console on the
parent server, you will see that 300 updates are approved. If you do the same on the
replica server, you will see that only 250 are approved. You would use
listinactiveapprovals to see a list of the updates on the parent upstream server that are
permanently inactive—in this case, you would see the 50 updates that are not English.
You can run this command if you want to see a list of the inactive approvals (for example,
to help you decide if you want to remove the inactive approvals). You do not have to run
this command before running the removeinactiveapprovals command.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil listinactiveapprovals
Removeinactiveapprovals
The scenario in which you would use this command is the same as the one described for
listinactiveapprovals. However, while you use listinactiveapprovals to list the inactive
approvals on the parent upstream server, you use removeinactiveapprovals to remove
them. You do not have to run the listinactiveapprovals command before running this
command.
Syntax
At the command line %drive%\Program Files\Update Services\Tools>, type:
wsusutil removeinactiveapprovals
Monitoring Windows Server Update Services
In this section

Update Status Terminology

Running Reports
61
Update Status Terminology
You can access update status from various locations in the WSUS console. The following
table defines each possible status that can be reported by WSUS for an update.
Typically, WSUS presents update status for a particular computer (for example, the
status of an update on one computer) or computer group (for example, status for the five
computers in Computer Group X on which the update has been installed).
Update Status Definitions
Status
Description
Installed
The update was installed on the computer.
62
Status
Description
Needed
This is the positive result of a Detect only
approval. When referring to the status of
one computer, Needed means the update is
compliant with (and should be installed on)
the computer. When referring to status for a
computer group, the Needed column
displays the number of computers in the
group with which the update is compliant.
Additionally, a positive Needed result
means, technically, that as of the last time
client computers made contact with the
WSUS server, the update was determined
to be compliant, but has not been installed.
Therefore, it is possible that any of the
following could be true when the status for
an update is Needed:
You have approved the update for
installation but the client computers have
not yet contacted the WSUS server since
you made this change.
You have not yet approved the update for
installation, although the Detect only action
has been performed.
The update has already been downloaded
and installed, but the client computer has
not contacted the WSUS server since the
update was installed.
The update has already been downloaded
and installed but the update requires that
the client computer be restarted before
changes go into effect, and the client
computer has not yet been restarted.
The update has been downloaded to the
computer but not installed.
The update has been neither downloaded
nor installed on the computer.
63
Status
Description
Not needed
This is the negative result of a Detect only
approval. When referring to the status of
one computer, Not needed means the
update is not compliant with or required by
that computer. When referring to the status
for a computer group, the Not needed
column displays the number of computers
in the group for which the update is not
compliant or required.
Unknown
Typically, this means that since the time
that the update was synchronized to the
WSUS server, the computer has not
contacted the WSUS server.
Failed
An error occurred when either a detection
or an installation was attempted on the
computer for the update.
Last contacted
This is the date on which the computer last
contacted the WSUS server.
Running Reports
Reports enable you to monitor the components of your Windows Server Update Services
implementation.
Using the Reports Page
You can generate three main reports from the Reports page, as described in the
following table, and in the sections that follow.
Reports Available on Reports Page
Report Name
Function
Status of Updates
View the status of all approved updates by
computer group and computer.
64
Report Name
Function
Status of Computers
View the status of client computers and the
status of updates on those computers (for
example, a summary of updates that have
been installed or are needed for a particular
computer).
Synchronization Results
View a list of new updates, update
revisions, and errors that occurred during
synchronization.
Settings Summary
View or print a summary of the settings
configured through the Options page.
Status of Updates Report
The Status of Updates report enables you to view the status for all of your approved
updates. You can view the report in three ways: you can view the status of an update at a
high level, by computer group, and by computer.
The report displays information resulting from the most recent contact between client
computers and the WSUS server. The frequency with which client computers contact the
WSUS server is configured through Group Policy. By default, this is every 22 hours.
Unless you want to change the contact frequency for your client computers, generate this
report the day after you approve updates, so that it reflects your latest approvals. For
more information about configuring Group Policy, see Deploying Microsoft Windows
Server Updates Services at http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Note:
You can use a command-line tool on client computers that are running the
WSUS client software (Automatic Updates) in order to initiate contact between
the client computer and WSUS server. This can be useful if you want to get
immediate update status for a particular computer—you can run this tool to force
connection and then generate a Status of Updates report.
To initiate immediate contact between a client computer and WSUS server

On the client computer, at the command prompt, type wuauclt.exe /detectnow,
and then press ENTER.
65
To run a Status of Updates report
1. On the WSUS console toolbar, click Reports.
2. On the Reports page, click Status of Updates.
Update summary view
The update summary view is the default view that appears when you run a Status of
Updates report. By default, the report displays an alphabetical list of approved updates.
You can filter the display by both approval action and computer group by making
appropriate selections under View and then clicking Apply. Your filter is reset to the
default list of all updates when you close the Status of Updates report.
The columns displayed in the update summary view are described in the following table.
Description of Columns Displayed in Update Summary View
Column Name
Description
Title
The name of the update.
To view the properties for an update, click
an update in this column. The update
properties box provides the following
information:
The Details tab contains general
information about the update.
The Status tab contains status information
for the update by computer group. This is
also what you see in computer group view.
You can also expand this view into
computer view by expanding a computer
group.
The Revisions tab displays information
about changes to the update.
Installed
The number of computers on which the
update has been installed.
66
Column Name
Description
Needed
The number of computers for which the
update is applicable but not installed. For
these computers, a detect-only action has
been performed for the update. If an update
requires a restart, then a computer that has
installed the update will continue to appear
in the Needed column until it is restarted.
Failed
The number of computers that last reported
a failed download, installation, or removal
(uninstallation).
Last Updated
The date that the latest action for this
update occurred.
Computer group view
The computer group view displays the status of an update by computer group. To use
this view, expand any update that is listed in update summary view.
The columns displayed in the computer group view are described in the following table.
Description of Columns Displayed in Computer Group View
Column Name
Description
Computer Group
The name of the computer group to which
the update has been targeted.
Approval
The action that this update has been
approved for, specific to the group.
Deadline
The deadline for the action, if you have set
a deadline.
Installed
The number of computers on which the
update has been installed.
67
Column Name
Description
Needed
The number of computers for which the
update is applicable but not installed. For
these computers, a detect-only action has
been performed for the update. If an update
requires a restart, then a computer that has
installed the update will continue to appear
in the Needed column until it is restarted.
Failed
The number of computers that last reported
a failed download, installation, or removal
(uninstallation).
Computer view
The computer view displays the status of each computer in a computer group. To use the
computer view, expand a computer group.
The columns displayed in this view are described in the following table.
Description of Columns Displayed in Computer View
Column Name
Description
Computer Name
Name of the computer
To see the properties for the computer, click
the computer name. The computer
properties dialog box that appears displays
details and status for the computer. The
Status tab displays the result of the last
communication between the WSUS server
and the computer, and the status of
updates for which an action has been
approved on the computer.
68
Column Name
Description
Status
The status will be one of the following:

Failed - The download, installation, or
removal action for the update on this
computer was not completed.

Needed - The update is applicable but
not installed. If an update requires a
restart, then a computer that has
installed the update will continue to be
counted as needed until it is restarted.

Not needed - The update is not
applicable.

Installed - The update has been
installed.

Unknown - No action has been
performed on the computer.
To see details for an event, click the result
in the Status column.
Printing the report
You can print the report in update summary, computer group, or computer view,
depending on how you have expanded the Status of Updates report.
To print the Status of Updates report
1. Expand your report into update summary, computer group, or computer view,
depending on the information you want to print.
2. Under Tasks, click Print report.
Note:
You cannot use the Print report task to print a dialog box, and the Print report
task is not enabled if a dialog box is open.
69
Status of Computers Report
The Status of Computers report provides both a cumulative and individual update status
summary for computers in the computer group and for the update status results you
specify. The following table provides more information about the status provided for each
update.
Description of Status Displayed in Status of Computers Report
Status
Description
Installed
The update was installed on the computer.
Needed
A detection was performed on the computer
for the update, which determined that the
update should be installed on the computer.
Not needed
Either the update is already installed on the
computer, or the update does not belong to
a product or classification you specified
when configuring synchronization options.
Unknown
Typically, this means that since the time
that the update was synchronized to the
WSUS server, the computer has not yet
contacted the WSUS server.
Failed
An error occurred when either a detection
or an installation was attempted on the
computer for the update.
Last contacted
This is the date on which the computer last
contacted the WSUS server.
You can also print the report, including the list of individual updates with status for
individual computers, if you have expanded the computers (clicked the + symbol).
However, you cannot print the dialog box that appears when you click individual updates
in the list or when you click the status for an individual update.
To run a status report for computers
1. On the WSUS console toolbar, click Reports, and then click Status of
Computers.
2. Under View, select the criteria you want to use to filter the report, and then click
70
Apply. The report displays a cumulative update status summary for all of the
computers in the computer group and for the status you specified.
3. If you want more information about a specific computer, you can do the following:

To view the status of individual updates for the computer, expand the
computer (click the + sign next to the computer). In addition, you can see the
properties of an individual update by clicking the title of the update.

To view more information about the specific status result of an update (or,
the event details), click the status for the update.
4. To print the report, under Tasks, click Print report.
Synchronization Results Report
The Synchronization Results report enables you to see synchronization information for
your server for a given time period, including errors that occurred during synchronization
and a list of new updates. In addition, you can get general, status, and revision
information for each new update.
To run a Synchronization Results report
1. On the WSUS console toolbar, click Reports.
2. On the Reports page, click Synchronization Results. By default, the report
displays synchronization results for the last 30 days.
3. To change the synchronization period for the report, under View, select another
synchronization period in the list, and then click Apply.
4. To print the report, under Tasks, click Print report.
Note:
The Print report task is not enabled if you have a dialog box open. You
cannot use the Print report task to print a dialog box.
The report has four components, which are described in the following table.
Components of Synchronization Results Report
Component Name
Purpose
Last Synchronization
Displays information about the last time the
WSUS server synchronized with Microsoft
Update or another WSUS server, and if it
was a successful synchronization.
71
Component Name
Purpose
Synchronization Summary
Displays summary information about new
updates and errors that occurred during
synchronization.
Errors
For each error, displays the date of the
error, a description of the error, and the
update ID associated with the error.
New Updates
Displays the updates that have been
synchronized to the WSUS server for the
given time period.
You can view the properties for each new
update by clicking the update in the New
Updates list. The update properties dialog
box that appears contains details, status,
and revision for the update. It is identical to
the update properties box that appears in
the Status of Updates report when you click
an update in the list. It is also identical to
the properties tabs associated with each
update on the Updates page.
Settings Summary Report
The Settings Summary report enables you to view and print a summary of all of the
settings that can be specified on the Options page.
To run a Settings Summary report
1. On the WSUS console toolbar, click Reports.
2. On the Reports page, click Settings Summary.
The following table describes the components of the Settings Summary report.
72
Components of Settings Summary Report
Component Name
Purpose
Synchronization Schedule
The time that your WSUS server
automatically synchronizes to the update
source.
Products and Classifications
The update products and classifications
that you want to synchronize with your
server.
Update source
The location from which the server
synchronizes.
Proxy server
The proxy server used during
synchronization.
Update Files
The location where update files are stored
(on the WSUS server or on Microsoft
Update). Also, the download options you
have selected.
Languages
The languages for the updates that
synchronize to the server. Only updates
available in the languages specified are
synchronized with the WSUS server.
Automatic Approval
The automatic approval settings for specific
update classifications, targeted by
computer group.
Revisions to Updates
The approval action that your WSUS server
will perform when revisions to existing
updates are available; whether update
revisions are automatically approved by
your server, or whether they must be
manually approved.
Downstream servers
The servers which receive updates from
the WSUS server.
Client computer Options
The method you have selected for
assigning computers to groups.
73
Component Name
Purpose
Database
The name of the database used by the
WSUS server.
To print a Settings Summary report

Under Tasks, click Print report.
Running Compliance Status Reports
You can view or print two types of compliance status reports, one for individual
computers and one for individual updates:
To run a computer compliance status report
1. On the WSUS console toolbar, click Computers, and then click the computer for
which you want to produce the compliance status report.
2. Click Print status report.
3. If you want more information about a specific update under Update Status, you
can do the following:

To view the properties of an individual update, click the title of the update.

To view more information about the specific status result of an update (or the
event details), click the status for the update.
4. To print the report, click the File menu, and then click Print.
To run an update compliance status report
1. On the WSUS console toolbar, click Updates, and then click the update for
which you want to produce the compliance report.
2. Click Print status report.
3. To print the report, click the File menu, and then click Print.
74
Securing Windows Server Update Services
For synchronization with upstream WSUS servers, you can use Secure Sockets Layer
(SSL) protocol to secure the update metadata portion of the synchronization. WSUS can
use SSL to:

Enable client computers and downstream WSUS servers to authenticate an
upstream WSUS server.

Encrypt metadata passed on to client computers and downstream WSUS servers.
For more information about configuring your WSUS server to use SSL, see Deploying
Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Troubleshooting Windows Server Update
Services
This guide provides troubleshooting information for Windows Server Update Services.
In this guide

WSUS Server Administration Issues

Client Computer Administration Issues
WSUS Server Administration Issues
In this section

Setup Issues

Uninstalling WSUS from SQL Server

Cannot access the WSUS console

Update storage issues

Synchronization issues

Update approval issues

Client computers do not appear in the WSUS console

Backup and restore issues
75

General error messages
Setup Issues
If you are having trouble installing WSUS, use the following information to troubleshoot
the problem.
Check for required software and hardware
WSUS has a number of requirements that need to be met prior to installation. For more
information, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
In some cases, setup might fail if you choose the WMSDE database
In some cases, when you choose the WMSDE database, Setup tries to repair WMSDE
and falls into an infinite loop. This is a known issue with the RC release of WSUS. Use
this Knowledge Base article at http://go.microsoft.com/fwlink/?LinkId=48007 to recover
from this problem and install WSUS by using WMSDE.
If the Server service is not running when you install WSUS, the
WSUS installation fails
If you select WMSDE for your database software and the Server service is not running on
the computer where you intend to install WSUS, the WSUS installation fails. This is
because WMSDE requires the Server service to be running to install, and if WMSDE fails
to be installed, the WSUS installation fails.
To work around this issue, turn on the Server service, and run WSUS Setup again. Use
the Knowledge Base article You cannot install MSDE 2000 if the Server service is not
running at http://go.microsoft.com/fwlink/?LinkId=48009 to recover from this problem and
install WSUS by using WMSDE.
You cannot install MSDE 2000 if the Server service is not running
Upgrade Issues
When an upgrade fails, WSUS might be uninstalled
Depending on at what point an upgrade fails, you might lose your previous WSUS
settings and data. Therefore, before attempting an upgrade, back up the following:
76

WSUS database

Update file storage folder
For information about backing up and restoring your existing WSUS installation, see
Backing Up Windows Server Update Services.
Uninstalling WSUS from SQL Server
If you uninstall WSUS, read the following information.
Uninstalling might leave some WSUS configurations on computers
running SQL server
Local SQL Server accounts that are created by WSUS Setup are not removed by the
WSUS uninstall component. The WSUS uninstall component does not remove Network
Service and ASP.NET accounts from the local computer running SQL server. If some
other application or database is using these accounts, this ensures that these
applications or databases do not fail. If you are sure that no other application or database
requires the Network Service or ASP.NET accounts, you can manually remove them from
the computer running SQL server.
For information about how to manually remove Network Service or ASP.NET accounts
from a computer running SQL Server 2000 or MSDE, see SQL Server product
documentation. You can download product documentation for SQL Server 2000 from the
SQL Server 2000 Books Online (Updated 2004) page of the Microsoft Web site at
http://go.microsoft.com/fwlink/?LinkId=13959.
Cannot access the WSUS console
If you get an error when using or trying to access the WSUS console, use the following
information to troubleshoot the problem.
Grant users permissions for WSUS console access
If users do not have appropriate permissions for the WSUS console, they receive an
"access denied" message when trying to access the WSUS console. You must be a
member of the Administrators group or the WSUS Administrators group on the server on
which WSUS is installed in order to use the WSUS console.
77
Note:
If WSUS is installed on a domain controller, only a member of the Domain
Administrator group can use the WSUS console.
To add a user to the WSUS Administrators group
1. On the WSUS server, click Start, click Administrative Tools, and then click
Computer Management.
2. In Computer Management, expand Local Users and Groups, click Groups,
and then double-click WSUS Administrators.
3. In the WSUS Administrators Properties dialog box, click Add.
4. In the Enter the object names to select (examples) box, type the object name,
and then click OK.
You cannot access the WSUS console with an IP address when
WSUS is configured to use a proxy server
If you have WSUS configured to use a proxy server, then you cannot access the WSUS
console by using an IP address. To work around this issue, use a domain name to
access the WSUS server, for example, for the username, type: DomainName\username
for the username, when prompted to log in on the WSUS console.
Cannot access the WSUS console and a timeout error message
appears
If you cannot access the WSUS console and a timeout error message appears, the CPU
of the WSUS server may be at, or very close to, maximum utilization, causing the
database to time out. If the database software times out, the WSUS console cannot be
displayed.
One way of inadvertently overtaxing your WSUS server is to have antivirus software
installed on it, which is monitoring the WSUS content directory. During synchronization,
the antivirus software can overload out the CPU. You can work around this situation by
setting the antivirus software to ignore where WSUS content is stored.
Cannot access the WSUS console on a Windows 2000 server after
applying the hisec server.inf security template
This issue applies only to Windows 2000 servers. If you cannot access the WSUS
administrative console after applying the hisec server.inf security template, you need to
78
relax security permissions for ASP.NET and IWAM local machine accounts in order for
the WSUS console to function.
The workaround is to give read access for IWAM and ASP.NET accounts to the following
registry key.
HKEY_LOCAL_MACHINE\software\microsoft\update services
To give read access for the IWAM account on Windows 2000 Server configured
as a domain controller
1. Click Start, and then click Run.
2. In the Open box, type regedit.exe and then click OK.
3. In Registry Editor, navigate to the following key:
HKEY_LOCAL_MACHINE \Software\Microsoft\Update Services
4. Point to Edit, and then click Permissions.
5. In the Permissions for Microsoft Windows Server Update Services properties
dialog box, click Add.
6. In the Select Users, Computers, or Groups box, click Locations.
7. In the Locations dialog box, select the local computer, and then click OK.
8. In the Select Users, Computers, or Groups box, type
computer_name\ASPNET and computer_name\IWAM_computer_name in the
Enter the object name to select (examples) box. Use a semicolon to separate
names. For example, type
computer_name\ASPNET;computer_name\IWAM_computer_name
where computer_name is the name of the computer.
9. Select computer_name\ASPNET, and click the Read box in the Allow column.
10. Select computer_name\IWAM_computer_name, and click the Read box in the
Allow column, and then click OK.
Promoting the WSUS server to a domain controller might disrupt
your ability to access the WSUS console
When you promote a WSUS server to a domain controller and then try to access the
WSUS console, you might receive a message similar to the following:
79
Server Error in '/' Application.
Access to the path "C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\Temporary ASP.NET
Files\wsusadmin\8c91a6b5\649b28ba\global.asax.xml" is denied.
This occurs if IIS 6.0 and ASP.NET are installed on the server before the server is
promoted to a domain controller. This is because the Network Service group does not
have sufficient permissions for the Temporary ASP.NET Files folder. To avoid this
problem, make sure that you promote the WSUS server to a domain controller before you
install IIS 6.0 and ASP.NET. To resolve this issue, enable appropriate permissions for the
Network Service group by using the following procedure.
To enable appropriate permissions for the Network Service group
1. Click Start, and then click Run.
2. In the Open box, type cmd, and then click OK.
3. At the command prompt, type the following, and then press ENTER:
drive:\windows\microsoft .net\framework\v1.1.4322\aspnet_regiis -i
where drive is the drive letter of the disk on which you installed Windows.
Cannot access the WSUS console on Windows 2000 Server
configured as a domain controller
If you cannot access the WSUS administrative console and you are using Windows 2000
Server configured as a domain controller, you need to relax security permissions for
ASP.NET in order for the WSUS console to function. The workaround is to give read
access for IWAM account to %windir%\assembly.
To give read access for the IWAM account on Windows 2000 Server configured
as a domain controller

At the command prompt, type the following, and then press ENTER:
cacls %windir%\assembly /e /t /p IWAM_xxxx:R
where %windir% is the Windows directory of the computer and where
IWAM_xxxx is the IWAM computer account.
80
For details, see the Knowledge Base article at
http://support.microsoft.com/default.aspx?scid=kb;[LN];317012
Update storage issues
Updates can be stored on the local WSUS server or on Microsoft Update. Use this
section to troubleshoot problems with update storage.
The updates listed in the WSUS console do not match the updates
listed in your local folder
This can happen under different circumstances. For example, if updates are stored on a
disk separate from the WSUS application itself, and that disk fails, when you replace the
failed disk with a new (empty) disk, the WSUS application will still show all of the updates
as downloaded.
To have WSUS verify which updates are stored on the disk, you must run the
WSUSutil.exe using the reset command.
Note:
Performing a reset causes the WSUS server to be unresponsive for up to five
minutes.
To have WSUS verify locally stored updates
1. Click Start, and then click Run.
2. In the Open box, type cmd, and then click OK.
3. At the command prompt, navigate to the directory that contains WSUSutil.exe.
4. Type the following, and then press ENTER: wsusutil.exe reset
Synchronization issues
Synchronization is the process in which the WSUS server connects to Microsoft Update
or to another WSUS server and downloads updates. During synchronization, WSUS
determines if any new updates have been made available since the last time you
synchronized. If it is your first time synchronizing WSUS, all updates are made available
for approval. If synchronizations are failing, you can try the following procedures.
81
Check proxy-server settings by using the WSUS console
If your WSUS server is connected to Microsoft Update via a proxy server, you must use
the WSUS console to allow WSUS to access the Internet. For basic instructions about
setting up a proxy server, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409. If your proxy server supports
authentication, make sure you have the correct user name, password, and domain. Note
that if you use the WSUS console option for Allow basic authentication (password in
clear text), the password for the account is sent over the network in unencrypted text.
Check the name of the upstream WSUS server
If your WSUS uses another WSUS server as its update source, make sure you are using
the correct name for the upstream WSUS server and that you have spelled it correctly.
For basic instruction about synchronizing two WSUS servers, see Deploying Microsoft
Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409. The name that you enter in the
WSUS console on the downstream WSUS server must match the name of the upstream
WSUS server.
To determine if there is a problem with network name resolution services, use the ping
command from the downstream WSUS server that cannot synchronize. You should use
the same naming convention that is used in the WSUS console. For example, if you used
a NetBIOS name in WSUS console, use the NetBIOS name of the upstream server with
the ping command. If you cannot ping the upstream server, you might have a problem
with network name resolution services. To work around this type of issue, you could use
a different name resolution service or the IP address of the upstream server.
To ping an upstream WSUS server by using the ping command
1. Click Start, and then click Run
2. In the Open box, type cmd, and then click OK.
3. Type the following, and then press ENTER:
ping WSUSServerNname
where WSUS server name is the name of the upstream WSUS server you are
trying to synchronize with.
82
Check update storage options
If you have multiple WSUS servers chained together in a hierarchy, the entire hierarchy
must use the same update storage option or else synchronizations fail. For example, if
the upstream WSUS server stores content locally, all the downstream WSUS servers
must store content locally. Check that each WSUS server in the chain uses the same
update storage option. For information about how to set WSUS update storage options,
see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Verify that users and the network service have Read permissions to
the local update storage directory
If you store update files on your WSUS server, you need to ensure that the folder to
which you download update files has at least Read permissions for the network service
and for users. This is true whether the server you download the update files to is an
upstream or downstream WSUS server. The folder where update files are stored if you
have chosen to store them locally (as opposed to storing them on Microsoft Update
servers) is %systemdrive%\Update Services\US content.
On a downstream WSUS server, check that the updates are available
on the upstream WSUS server
There are number of situations where the updates on the upstream server no longer
match the updates being requested at synchronization by the downstream server. Some
of the following are examples of when this might occur:

An upstream WSUS server is re-installed and the list of classifications and products
the administrator selects is a reduced number than previously selected on the earlier
installation of the WSUS upstream server. The downstream server(s) might then
attempt to synchronize updates that the newly rebuilt upstream server has no
knowledge of. Therefore the synchronization would fail for those updates that do not
exist on the upstream server.

If you configure a downstream server to get updates from a different upstream server
with different products and classifications selected.
To troubleshoot this issue, on the downstream server, make a note of the title of the
updates for which download failed. These will be visible on the Updates page, and
marked with a red X. Then, check if these updates exist on the upstream server (look at
the Updates page. If they do not match, do one of the following, depending on which
updates you need:
83

Specify the missing updates on the upstream server, and then synchronize from
the update source.

On the downstream server, cancel the updates that are not on the upstream server, if
these updates are no longer needed. Then decline the old updates on the
downstream server.

If the missing updates (according to the downstream server) are actually available on
the upstream server, then the error is transient, meaning the update might have been
downloaded to the upstream server after it was requested by the downstream server.
This issue will resolve itself the next time the downstream server synchronizes to the
upstream server.
Restart the BITS service
If the BITS service was disabled during synchronization, synchronization will fail. To
ensure that the BITS services is properly enabled, restart both the BITS service and
restart the WSUS service.
To restart the BITS service and the WSUS service
1. On the WSUS server, click Start, point to Administrative Tools, and then click
Services.
2. Right-click Background Intelligent Transfer Service, and then click Restart, or
click Start if the BITS service is not running or has been disabled.
3. Right-click Windows Update Service, and then click Restart.
4. Retry synchronization: in the WSUS console, click Options, click
Synchronization Options, and then under Tasks, click Synchronize now.
If you are unable to download update files to your local WSUS server,
your server might not support the necessary HTTP protocol
If synchronization of update files to your WSUS server fails, you might see the following
message in the corresponding event log:
Content file download failed. Reason: The server does not support the necessary
HTTP protocol. Background Intelligent Transfer Service (BITS) requires that the
server support the Range protocol header.Source File: /msdownload/update/v319990518/cabpool/windows2000-kb873339-x86enu_500e4656b4f0ca3431565631989090bbeeb74bcc.exe Destination File:
84
%drive%\wsus\WsusContent\WsusContent\CC\500E4656B4F0CA3431565631989090BBEEB74BCC
.EXE.
This problem occurs if your proxy environment doesn’t support HTTP 1.1 Protocol. You
can manually work around this by running the following commands at the command
prompt to configure BITS.
To resolve this issue:
1. Type: net stop WSUSService, and then press ENTER.
2. Type: "%programfiles%\Update Services\tools\osql\osql.exe" S SQL_InstanceName -E -b -n –Q "USE SUSDB update tbConfigurationC set
BitsDownloadPriorityForeground=1" and then press ENTER.
3. Type: net start WSUSService.
4. Close the command prompt window and retry synchronization: in the WSUS
console, click Options, click Synchronization Options, and then under Tasks,
click Synchronize now.
The number of updates that are approved on a parent upstream
server does not match the number of approved updates on a replica
server
This might occur if you have changed language settings on the parent upstream server
after first synchronizing with the old language settings. For more information see
"Listinactiveapprovals" in Managing WSUS from the Command Line.
Update approval issues
If you are having problems with approvals, use the following sections to troubleshoot the
problem.
If IIS Lockdown is installed on WSUS and client computers, do not
download updates stored on the WSUS server
If you are using the IIS Lockdown Wizard and have installed the URLScan tool, ensure
that you edit the Urlscan.ini file to allow *.exe requests.
After you edit this file, you must restart both IIS and the WSUS server. You can find the
Urlscan.ini file in the\WINNT\System32\Inetserv\Urlscan directory on the boot drive of
your computer.
85
To edit the Urlscan.ini file
1. Open Urlscan.ini in a text editor.
2. Remove ".exe" from the [DenyExtensions] section.
3. Make sure the following settings appear under the [AllowVerbs] section:

GET

HEAD

POST

OPTIONS
New approvals can take up to one minute to take effect
If you approve an update on the WSUS console and there are client computers running
detection at that exact moment, those computers might not get the approved update until
they go through another detection cycle. The WSUS server requires approximately one
minute to begin offering newly approved updates to client computers.
Remote computers accessed by using Terminal Services cannot be
restarted by non-administrators
Non-administrators using terminal services computers will not be able to restart their
computers remotely. Therefore, if a remote computer on which an update is installed
needs to be restarted for the update to take effect, users without administrative
permissions will be unable to complete the updating of their remote computer.
The number of updates that are approved on a parent upstream
server does not match the number of approved updates on a replica
server
This might occur if you have changed language settings on the parent upstream server
after first synchronizing with the old language settings. For more information see
"Listinactiveapprovals," in Managing WSUS from the Command Line.
Client computers do not appear in the WSUS console
If you are having problems with client computers not appearing on the Computers page
in WSUS console, use the following sections to troubleshoot the problem.
86
Problem with client self-update
If you cannot get clients to appear on the Computers page in the WSUS console, it is
almost always a problem with client self-update, which is the mechanism that WSUS
uses to update the SUS client to the WSUS client (Automatic Updates) software. For
more information about client-self update, see Automatic Updates must be updated.
Backup and restore issues
If you cannot access WSUS data after restoring the database, check
the WSUS server name and user permissions for the database
If you restore a WSUS database but cannot access the restored from the WSUS console
check for the following:

If you have changed the WSUS server name since the backup, you must add the
corresponding users to the database to enable the WSUS console to access the
data.

If you restore the backup to a WSUS server other than the one from which you
backed up the database, you will have the same result and must also add the
corresponding users.

In either case, the users need to be granted permissions for public and Web service.
General error messages
This topic covers general error messages displayed on the Home page or in dialog boxes
that open from the WSUS console.
…some services are not running. Check the following services…
On the Home page, you might receive a message telling you to check specific services.
The following briefly covers the services.
Selfupdate
See Automatic Updates must be updated for information about troubleshooting the
Selfupdate service.
87
WSUSService.exe
This service facilitates synchronization. If you have problems with synchronization,
access WSUSService.exe by clicking the Start button, pointing to Administrative Tools,
clicking Services, and then finding Windows Server Update Service in the list of
services. Do the following:

Verify that this service is running. Click Start if it is stopped or Restart to refresh the
service.

You can also use Event Viewer to check the Application, Security, and System
event logs to see if there are any events that might indicate a problem.

You can also check the SoftwareDistribution.log to see if there are events that might
indicate a problem.
Web services
Web services are hosted in IIS. If they are not running, ensure that IIS is running (or
started). You can also try resetting the Web service by typing iisreset at a command
prompt.
SQL service
Every service except for the selfupdate service requires that the SQL service is running.
If any of the log files indicate SQL connection problems, check the SQL service first. To
access the SQL service, click the Start button, point to Administrative Tools, click
Services, and then look for one of the following:

MSSQLSERVER (if you are using WMSDE or MSDE, or if you are using SQL Server
and are using the default instance name for the instance name)

MSSQL$WSUS (if you are using a SQL Server database and have named your
database instance "WSUS")
Right-click the service, and then click Start if the service is not running or Restart to
refresh the service if it is running.
Client Computer Administration Issues
In this section

Automatic Updates must be updated

Computers are not appearing in the correct computer groups
88
Automatic Updates must be updated
WSUS uses IIS to automatically update most computers to the WSUS-compatible
Automatic Updates (WSUS client). This process is called client self-update. To
accomplish client self-update, WSUS Setup creates a virtual directory under the WSUS
Web site named Selfupdate. This virtual directory holds the WSUS-compatible Automatic
Updates. This is called the selfupdate tree.
Using Group Policy to point client computers to your WSUS server should eventually
cause an Automatic Updates detection and client self-update. For more information about
this process, see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Troubleshooting client self-update issues
If the client self-update does not work automatically, use the following suggestions to
troubleshoot the problem.
How to differentiate between the SUS client and WSUS client
Use the Automatic Updates user interface (UI) to differentiate between the SUS and
WSUS clients. The following illustrations show the user interface of the SUS and WSUS
clients.
89
SUS Client
90
WSUS Client
Verify that the client software in your organization can self-update
Some computers might already have the WSUS client installed. Other computers might
have a version of Automatic Updates that is incapable of performing self-update. For
more information see Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409. If the clients in your
organization are capable of and require self-update but are still not self-updating, see the
next section.
Verify that the SUS clients are pointed to the WSUS server
If you have the WSUS client installed but the client computer is pointed to a SUS server,
Automatic Updates falls into legacy mode and the client computer uses the SUS client
user interface. In this case you need to redirect the computer away from the SUS server
91
to get the WSUS client to function. When you point Automatic Updates away from the
SUS server, it automatically comes out of legacy mode and the new client user interface
appears.
If your client computers are pointed to the WSUS server and you do not see the WSUS
client user interface shown above, see the next section.
Check for the selfupdate tree on the WSUS server
WSUS uses IIS to automatically update most client computers to the WSUS-compatible
Automatic Updates. To accomplish this, WSUS Setup creates a virtual directory named
Selfupdate, under the Web site running on port 80 of the computer where you install
WSUS. This virtual directory, called the self-update tree, holds the latest WSUS client.
For this reason, you must have a Web site running on port 80, even if you put the WSUS
Web site on a custom port. The Web site on port 80 does not have to be dedicated to
WSUS. In fact, WSUS only uses the site on port 80 to host the self-update tree.
To ensure that the self-update tree is working properly, first make sure there is a Web
site set up on port 80 of the WSUS server. Next, type the following at the command
prompt of the WSUS server:
cscript WSUSInstallationDrive:\program files\microsoft windows server update
services\setup\InstallSelfupdateOnPort80.vbs
If you have WSUS client self-update running on port 80 of the WSUS server, see the next
section.
Check IIS logs on the WSUS Server
Check the IIS logs on the WSUS server. IIS logs are typically located in
%windir%\system32\LogFiles\W3SVC1 for the default Web site. If you copied the
Wutrack.bin file to the \InetPub\wwwroot folder on the WSUS server when you set up
client self-update, you can open the IIS logs and search for Wutrack.bin to attempt to
locate error messages about why self-update is failing. Typical errors might be 404 (file
not found) 401/403 (authentication/access), and 500 (Internal server error). Use IIS Help
to troubleshoot any problems found in the IIS logs.
If you have installed SharePoint on the default Web site in IIS, configure
SharePoint to not interfere with Self-update
If you install Microsoft SharePoint on the same server that is running WSUS, you might
get the following issues:

An "Access denied" message appears when Automatic Updates tries to update itself,
and the latest Automatic Updates will not be running.
92

On the Home page, you a message appears warning you that the SelfUpdate
service is not available.
If client computers are not running the WSUS-compatible version of Automatic Updates,
they will not be able to receive updates through WSUS.
To resolve this issue
1. Grant Anonymous access (Anonymous Auth) to the Default Web site,
ClientWebService and Selfupdate v-roots in IIS.
2. Exclude specific requests from being intercepted by the SharePoint ISAPI DLL
by doing the following:
a. Open the SharePoint Central Administration Site (click Start, point to
Administrative Tools, and then click Sharepoint Central Administration).
b. Click Virtual Server Configuration, and then click Configure Virtual
Server Settings.
c.
Click Default Web Site.
d. Click Virtual Server Management, and then click Define managed paths.
e. In the Add a new pathbox, set the type to excluded path. Under Path, type
the following:

"/iuident.cab"

"/wutrack.bin"

"/clientwebservice"

"/Selfupdate"
Check network connectivity on the WSUS client computer
Check network connectivity on the WSUS client computer. Use Internet Explorer to
determine if self-update files on the WSUS server are accessible to the client computer. If
you perform the following procedure and are prompted to download or open the files, you
have verified network connectivity. It is not necessary to save or open the files. You
cannot self-update Automatic Updates this way. If you do not have access to these files,
troubleshoot network connectivity between the WSUS client computer and the WSUS
server.
To check network connectivity on the WSUS client computer
1. Click Start, and then click Run.
93
2. In the Open box, type iexplore and then press ENTER
3. In the Internet Explorer Address bar, type:
http://WSUSServerName/iuident.cab
where WSUS server name is the name of your WSUS server. Ensure that you are
prompted to download or open Iuident.cab. This verifies network connectivity from the
WSUS client and the availability of the Iuident.cab file on the WSUS server.
4. If there are any boxes prompting you to download or save, click Cancel. In Internet
Explorer Address bar, type:
http://WSUSServerName/selfupdate/AU/x86/osvariable/languagevariable/wuaucomp.cab
where WSUSServerName is the name of your WSUS server and where osvariable is a
variable indicating the operating system of the client computer. The possible variables for
osvariableare NetServer, W2K or XP, and where languagevariable is a variable indicating
the language of the operating system of the client computer. The possible variables for
oslanguage are based on the standard 2- to 4-letter language abbreviations. For example,
here is a URL for a client computer running an English version of Windows XP:
http://WSUSServerName/selfupdate/AU/x86/XP/EN/wuaucomp.cab
Ensure that you are prompted to download or save Wuaucomp.cab. This verifies network
connectivity from the WSUS client and the availability of the Iuident.cab file on the WSUS
server.
If you are prompted to save or download both of these files, see the next section.
Check logs on the SUS client computer
Check the %windir%\windows update.log on the client computer to see if there has been
any activity or any attempts to contact the server. Check the %systemdrive%\program
files\windowsupdate\v4\urllog.dat file on the client computer for cached server pingbacks
if the client computer has not been able to communicate with the server.
These files are hidden by default. Use the following procedure to display hidden files and
folders in Windows Server 2003.
To display hidden files and folders on Windows Server 2003
1. In Control Panel, open Folder Options.
2. On the View tab, under Hidden files and folders, click Show hidden files and
folders.
If you can find no problem with the logs on the WSUS client, see the next section.
94
Manipulate registry settings on the SUS client computer
If all else has failed, you can attempt to manually manipulate registry settings to get the
client computer to self-update to the WSUS client.
To manually manipulate registry settings on the SUS client computer
1. Click Start, and then click Run.
2. In the Open box, type regedit and then click OK.
3. In Registry Editor, navigate to the WindowsUpdate key by expanding the following:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\
If the WindowsUpdate key does not exist, do the following:
4. On the menu, click Edit, point to New, and then click Key.
5. Type WindowsUpdate as the name for the new key.
6. Double-click the WUServer setting, type the URL to your WSUS server, and then press ENTER.
If the WUServer setting does not exist, do the following:
7. Type WUServer as the setting name.
8. Double-click the WUStatusServer setting, type the URL to your WSUS server, and then press
ENTER.
If the WUStatusServer setting does not exist, do the following:
9. Type WUStatusServer as the setting name.
10. Navigate to the following:
HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
If the AU key does not exist, do the following:
11. Type AU as the name for the new key.
12. Verify that the UseWUServer setting has a value of 1 (0x1).If it does not, modify it by doubleclicking the setting and then changing the value.
If the UseWUServer setting does not exist, do the following:
13. Type UseWUServer for the setting name.
14. Navigate to the following:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto
Update
95
15. Enable and configure Automatic Updates through Control Panel:
Click Start, click Control Panel, and then double-click Automatic Updates.
16. In the Automatic Updates dialog box, specify download and installation options, and then click
OK. Make sure that Turn off Automatic Updates is not selected.
17. Ensure that the AUState setting has a value of 2 (0x2). If it does not, modify it by double-clicking
and changing the value.
18. If the LastWaitTimeout setting exists, delete it.
19. If the DetectionStartTime setting exists, delete it.
20. At the command prompt, type the following, and then press ENTER to stop the Automatic Updates
service:
net stop wuauserv
21. At the command prompt, type the following, and then press ENTER to restart the Automatic
Updates service:
net start wuauserv
22. Wait approximately 6 to 10 minutes for the self-update to occur.
To force the SUS client computer to check with the WSUS server

Wait approximately one minute, and then refresh the registry. You should now
see the following settings and values:

DetectionStartTime (REG_SZ) YYYY.MM.DD HH.MM.SS. The
DetectionStartTime value is written in local time, but the detection actually
occurs 5 minutes after the time noted.

LastWaitTimeout (REG_SZ) YYYY.MM.DD HH.MM.SS. The
LastWaitTimeout value is written in GMT or Universal Time, and represents
the actual time that detection occurs.
Although these values refer to the time that detection is going to start, the first phase of
detection is the process of checking whether a self-update is necessary. Therefore, these
values actually refer to when self-update from SUS client to the WSUS client should
occur.
If the client software has not self-updated after ten minutes, refresh the \Auto Update
registry key. If the LastWaitTimeout value has changed and is now 24 hours later than
its previous value, that indicates that Automatic Updates was not able to contact the
server URL that you specified in the WUServer value.
96
Computers are not appearing in the correct computer
groups
Client-side targeting is when you use Group Policy or registry settings to move computers
into target groups. For more information about how to set up client-side targeting, see
Deploying Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409. There are a number or
reasons why computers might not appear in groups when you are using client-side
targeting. Use the following information to try to resolve this problem.
Verify that the WSUS console is set to use client-side targeting
By default, the WSUS server is set to use server-side targeting. If you are using clientside targeting, you need to set an option on the WSUS server. For more information
about how to set up client-side targeting, see Deploying Microsoft Windows Server
Update Services at http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
Verify that target computer group names match groups on the WSUS
server
Make sure the name of the target computer group in Group Policy matches the name of
the computer group on the WSUS server. Check the Group Policy object (GPO) or the
registry setting where you enabled client-side targeting. Make sure that there are no
discrepancies between the name of the computer group used in Group Policy and the
name of the group used on the server. If WSUS cannot find a computer group on the
server reported by a client computer, it loads the computer into the Unassigned
Computers group.
Wait an hour for changes to take effect
If you make a change to group membership by using client-side targeting and the client
computer has already contacted the WSUS server, it takes an hour for the server to
change the computer’s group membership. This is because WSUS uses cookies to
manage group membership with client-side targeting and these cookies are set to expire
after one hour.
If you cannot wait an hour, use command-line options to reset the cookie and initiate
detection. For information about how to use command-line options, see Deploying
Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?linkid=41777&clcid=0x409.
97
Additional Resources for Windows
Server Update Services
For more information and support, see the following resources.
Windows Server Update Services
Communities
Microsoft communities are great places to exchange ideas with other users and discuss
common issues. You can read and write messages by using an NNTP-based newsreader
such as Microsoft Outlook Express. You can also use the Web-based newsreader
provided by Microsoft to access all of the newsgroups. To access the WSUS
Communities, go to the following:

Windows Server Update Services Communities Homepage at
http://go.microsoft.com/fwlink/?LinkID=45215

Windows Server Update Services Public Newsgroup at
http://go.microsoft.com/fwlink/?LinkID=42318.
More Documentation

For high-level information about what's new and features of WSUS, see Microsoft
Windows Server Update Services Overview at
http://go.microsoft.com/fwlink/?LinkID=42213.

For step-by-step guidance for getting started, including installing WSUS, setting up a
client computer, and deploying your first set of updates, see Step-by-Step Guide to
Getting Started with Microsoft Windows Server Update Services at
http://go.microsoft.com/fwlink/?LinkID=41774.

For information about planning for, installing, and then configuring WSUS
components and infrastructure, see Deploying Microsoft Windows Server Update
Services at http://go.microsoft.com/fwlink/?linkid=41777.

For information that helps you automate tasks or customize WSUS, see the Microsoft
Windows Server Update Services Software Developer's Kit at
http://go.microsoft.com/fwlink/?LinkID=43099 and Windows Update Agent Software
Developer's Kit at http://go.microsoft.com/fwlink/?LinkID=43101. Note that the
Windows Update Agent is the Automatic Updates service. Both SDKs contain
98
information about the application programming interface (API), as well as sample
scripts and ready-to-use tools for your WSUS deployment and implementation.